Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2017.bht:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/iacr/000117,
  author       = {Lorenzo Grassi},
  title        = {Mixture Differential Cryptanalysis: New Approaches for Distinguishers
                  and Attacks on round-reduced {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {832},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/832},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/000117.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/000117a,
  author       = {Yusuke Naito},
  title        = {Blockcipher-based MACs: Beyond the Birthday Bound without Message
                  Length},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/852},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/000117a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/000117b,
  author       = {Lorenzo Grassi},
  title        = {MixColumns Properties and Attacks on (round-reduced) {AES} with a
                  Single Secret S-Box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1200},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/000117b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001LPRS17,
  author       = {Zhe Liu and
                  Patrick Longa and
                  Geovandro C. C. F. Pereira and
                  Oscar Reparaz and
                  Hwajeong Seo},
  title        = {FourQ on embedded devices with strong countermeasures against side-channel
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001LPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001M17,
  author       = {Sebastian Meiser and
                  Esfandiar Mohammadi},
  title        = {Ratio Buckets: {A} Numeric Method for r-Fold Tight Differential Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1034},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001M17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001MW17,
  author       = {Divya Gupta and
                  Hemanta K. Maji and
                  Mingyuan Wang},
  title        = {Constant-rate Non-malleable Codes in the Split-state Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1048},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1048},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/0001MW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001W17,
  author       = {Alexander Koch and
                  Stefan Walzer},
  title        = {Foundations for Actively Secure Card-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/423},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/0001W17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001ZWGL17,
  author       = {Yu Yu and
                  Jiang Zhang and
                  Jian Weng and
                  Chun Guo and
                  Xiangxue Li},
  title        = {Collision Resistant Hashing from Learning Parity with Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1260},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1260},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/0001ZWGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0003FL17,
  author       = {Xiaojuan Zhang and
                  Xiutao Feng and
                  Dongdai Lin},
  title        = {Fault Attack on {ACORN} v3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {855},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/855},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0003FL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0008MXL17,
  author       = {Wei Yu and
                  Saud Al Musa and
                  Guangwu Xu and
                  Bao Li},
  title        = {A Novel Pre-Computation Scheme of Window {\(\tau\)}NAF for Koblitz
                  Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1020},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1020},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0008MXL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0021G17,
  author       = {Jie Chen and
                  Junqing Gong},
  title        = {{ABE} with Tag Made Easy: Concise Framework and New Instantiations
                  in Prime-order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {859},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/859},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0021G17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AarajCM17,
  author       = {Najwa Aaraj and
                  Florian Caullery and
                  Marc Manzano},
  title        = {MILP-aided Cryptanalysis of Round Reduced ChaCha},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1163},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AarajCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP17,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  title        = {Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing
                  Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/500},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP17a,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {On the Tightness of Forward-Secure Signature Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/746},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaCFGU17,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Dario Fiore and
                  Romain Gay and
                  Bogdan Ursu},
  title        = {Multi-Input Functional Encryption for Inner Products: Function-Hiding
                  Realizations and Constructions without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {972},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/972},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaCFGU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemAG17,
  author       = {Mohamed Ahmed Abdelraheem and
                  Tobias Andersson and
                  Christian Gehrmann},
  title        = {Inference and Record-Injection Attacks on Searchable Encrypted Relational
                  Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemAG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiBLZ17,
  author       = {Behzad Abdolmaleki and
                  Karim Baghery and
                  Helger Lipmaa and
                  Michal Zajac},
  title        = {A Subversion-Resistant {SNARK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiBLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeHNOP17,
  author       = {Masayuki Abe and
                  Dennis Hofheinz and
                  Ryo Nishimaki and
                  Miyako Ohkubo and
                  Jiaxin Pan},
  title        = {Compact Structure-preserving Signatures with Almost Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/524},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeHNOP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbrahamMN0S17,
  author       = {Ittai Abraham and
                  Dahlia Malkhi and
                  Kartik Nayak and
                  Ling Ren and
                  Alexander Spiegelman},
  title        = {Solida: {A} Blockchain Protocol Based on Reconfigurable Byzantine
                  Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1118},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbrahamMN0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahACKPR17,
  author       = {Hamza Abusalah and
                  Jo{\"{e}}l Alwen and
                  Bram Cohen and
                  Danylo Khilko and
                  Krzysztof Pietrzak and
                  Leonid Reyzin},
  title        = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs
                  of Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {893},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/893},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbusalahACKPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AcharyaD17,
  author       = {Kamalesh Acharya and
                  Ratna Dutta},
  title        = {Adaptively Secure Recipient Revocable Broadcast Encryption with Constant
                  size Ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AcharyaD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AcharyaD17a,
  author       = {Kamalesh Acharya and
                  Ratna Dutta},
  title        = {Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference
                  Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AcharyaD17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdomnicaiFM17,
  author       = {Alexandre Adomnicai and
                  Jacques J. A. Fournier and
                  Laurent Masson},
  title        = {Bricklayer Attack: {A} Side-Channel Analysis on the ChaCha Quarter
                  Round},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdomnicaiFM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AfsharMR17,
  author       = {Arash Afshar and
                  Payman Mohassel and
                  Mike Rosulek},
  title        = {Efficient Maliciously Secure Two Party Computation for Mixed Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AfsharMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDHS17,
  author       = {Abhinav Aggarwal and
                  Varsha Dani and
                  Thomas P. Hayes and
                  Jared Saia},
  title        = {Distributed Computing with Channel Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {710},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/710},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalJPS17,
  author       = {Divesh Aggarwal and
                  Antoine Joux and
                  Anupam Prakash and
                  Miklos Santha},
  title        = {A New Public-Key Cryptosystem via Mersenne Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalJPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AghiliM17,
  author       = {Seyed Farhad Aghili and
                  Hamid Mala},
  title        = {Security Analysis of an Ultra-lightweight {RFID} Authentication Protocol
                  for M-commerce},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AghiliM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AghiliM17a,
  author       = {Seyed Farhad Aghili and
                  Hamid Mala},
  title        = {On the security of another {CRC} based ultralightweight {RFID} authentication
                  protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1054},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AghiliM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Agievich17,
  author       = {Sergey Agievich},
  title        = {{EHE:} nonce misuse-resistant message authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Agievich17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBPSY17,
  author       = {Shweta Agrawal and
                  Sanjay Bhattacherjee and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}} and
                  Shota Yamada},
  title        = {Efficient Public Trace and Revoke from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBPSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalC17,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  title        = {Simplifying Design and Analysis of Complex Predicate Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalC17a,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  title        = {{FAME:} Fast Attribute-based Message Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {807},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/807},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalC17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmetzyanovaAOS17,
  author       = {Liliya R. Ahmetzyanova and
                  Evgeny K. Alekseev and
                  Igor B. Oshkin and
                  Stanislav V. Smyshlyaev},
  title        = {Increasing the Lifetime of Symmetric Keys for the {GCM} Mode by Internal
                  Re-keying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/697},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmetzyanovaAOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkaviaLM17,
  author       = {Adi Akavia and
                  Rio LaVigne and
                  Tal Moran},
  title        = {Topology-Hiding Computation on all Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkaviaLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkaviaM17,
  author       = {Adi Akavia and
                  Tal Moran},
  title        = {Topology-Hiding Computation Beyond Logarithmic Diameter},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkaviaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkiyamaGOTNHSI17,
  author       = {Koichiro Akiyama and
                  Yasuhiro Goto and
                  Shinya Okumura and
                  Tsuyoshi Takagi and
                  Koji Nuida and
                  Goichiro Hanaoka and
                  Hideo Shimizu and
                  Yasuhiko Ikematsu},
  title        = {A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations
                  (Giophantus)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1241},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkiyamaGOTNHSI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyEYG17,
  author       = {Riham AlTawy and
                  Muhammad ElSheikh and
                  Amr M. Youssef and
                  Guang Gong},
  title        = {Lelantos: {A} Blockchain-based Anonymous Physical Delivery System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyEYG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyRHMYG17,
  author       = {Riham AlTawy and
                  Raghvendra Rohit and
                  Morgan He and
                  Kalikinkar Mandal and
                  Gangqiang Yang and
                  Guang Gong},
  title        = {sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic
                  Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {747},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/747},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyRHMYG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlagicGM17,
  author       = {Gorjan Alagic and
                  Tommaso Gagliardoni and
                  Christian Majenz},
  title        = {Unforgeable Quantum Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {960},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/960},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlagicGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlagicM17,
  author       = {Gorjan Alagic and
                  Christian Majenz},
  title        = {Quantum non-malleability and authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/533},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlagicM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlamBMB17,
  author       = {Manaar Alam and
                  Sarani Bhattacharya and
                  Debdeep Mukhopadhyay and
                  Sourangshu Bhattacharya},
  title        = {Performance Counters to Rescue: {A} Machine Learning based safeguard
                  against Micro-architectural Side-Channel-Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/564},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlamBMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlamatiPS17,
  author       = {Navid Alamati and
                  Chris Peikert and
                  Noah Stephens{-}Davidowitz},
  title        = {New (and Old) Proof Systems for Lattice Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1226},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlamatiPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Albrecht17,
  author       = {Martin R. Albrecht},
  title        = {On dual lattice attacks against small-secret {LWE} and parameter choices
                  in HElib and {SEAL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Albrecht17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtD17,
  author       = {Martin R. Albrecht and
                  Amit Deo},
  title        = {Large Modulus Ring-LWE {\textgreater}= Module-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {612},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/612},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDLP17,
  author       = {Martin R. Albrecht and
                  Alex Davidson and
                  Enrique Larraia and
                  Alice Pellet{-}Mary},
  title        = {Notes On {GGH13} Without The Presence Of Ideals},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {906},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/906},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtDLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGVW17,
  author       = {Martin R. Albrecht and
                  Florian G{\"{o}}pfert and
                  Fernando Virdia and
                  Thomas Wunderer},
  title        = {Revisiting the Expected Cost of Solving uSVP and Applications to {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {815},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/815},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtGVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtOPPS17,
  author       = {Martin R. Albrecht and
                  Emmanuela Orsini and
                  Kenneth G. Paterson and
                  Guy Peer and
                  Nigel P. Smart},
  title        = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtOPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AldermanMR17,
  author       = {James Alderman and
                  Keith M. Martin and
                  Sarah Louise Renwick},
  title        = {Multi-level Access in Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AldermanMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlexopoulosKTZ17,
  author       = {Nikolaos Alexopoulos and
                  Aggelos Kiayias and
                  Riivo Talviste and
                  Thomas Zacharias},
  title        = {MCMix: Anonymous Messaging via Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {778},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/778},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlexopoulosKTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlkadriBBK17,
  author       = {Nabil Alkeilani Alkadri and
                  Johannes Buchmann and
                  Rachid El Bansarkhani and
                  Juliane Kr{\"{a}}mer},
  title        = {A Framework to Select Parameters for Lattice-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/615},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlkadriBBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlmeidaBBDGLP17,
  author       = {Jos{\'{e}} Bacelar Almeida and
                  Manuel Barbosa and
                  Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir and
                  Benjamin Gr{\'{e}}goire and
                  Vincent Laporte and
                  Vitor Pereira},
  title        = {A Fast and Verified Software Stack for Secure Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {821},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/821},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlmeidaBBDGLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alperin-Sheriff17,
  author       = {Jacob Alperin{-}Sheriff and
                  Jintai Ding and
                  Albrecht Petzoldt and
                  Daniel Smith{-}Tone},
  title        = {Total Break of the Fully Homomorphic Multivariate Encryption Scheme
                  of 2017/458: Decryption can not be of low degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Alperin-Sheriff17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alperin-Sheriff17a,
  author       = {Jacob Alperin{-}Sheriff and
                  Daniel Apon},
  title        = {Weak is Better: Tightly Secure Short Signatures from Weak PRFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Alperin-Sheriff17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenBH17,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki and
                  Benjamin Harsha},
  title        = {Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenBH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenT17,
  author       = {Jo{\"{e}}l Alwen and
                  Bj{\"{o}}rn Tackmann},
  title        = {Moderately Hard Functions: Definition, Instantiations, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {945},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/945},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlyC17,
  author       = {Abdelrahaman Aly and
                  Sara Cleemput},
  title        = {An Improved Protocol for Securely Solving the Shortest Path Problem
                  and its Application to Combinatorial Auctions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {971},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/971},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlyC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlyV17,
  author       = {Abdelrahaman Aly and
                  Mathieu Van Vyve},
  title        = {Practically Efficient Secure Single-Commodity Multi-Market Auctions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlyV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmadoriPS17,
  author       = {Alessandro Amadori and
                  Federico Pintore and
                  Massimiliano Sala},
  title        = {On the discrete logarithm problem for prime-field elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmadoriPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbronaBGW17,
  author       = {Miguel Ambrona and
                  Gilles Barthe and
                  Romain Gay and
                  Hoeteck Wee},
  title        = {Attribute-Based Encryption in the Generic Group Model: Automated Proofs
                  and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {983},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/983},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbronaBGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbroseBFJLM17,
  author       = {Christopher Ambrose and
                  Joppe W. Bos and
                  Bj{\"{o}}rn Fay and
                  Marc Joye and
                  Manfred Lochter and
                  Bruce Murray},
  title        = {Differential Attacks on Deterministic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {975},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/975},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbroseBFJLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnadaA17,
  author       = {Hiroaki Anada and
                  Seiko Arita},
  title        = {Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnadaA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ananth017,
  author       = {Prabhanjan Ananth and
                  Abhishek Jain},
  title        = {On Secure Two-Party Computation in Three Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {942},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/942},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ananth017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthCJ17,
  author       = {Prabhanjan Ananth and
                  Arka Rai Choudhuri and
                  Abhishek Jain},
  title        = {A New Approach to Round-Optimal Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/402},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthCJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJS17,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Amit Sahai},
  title        = {Robust Transforming Combiners from Indistinguishability Obfuscation
                  to Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AngelCLS17,
  author       = {Sebastian Angel and
                  Hao Chen and
                  Kim Laine and
                  Srinath T. V. Setty},
  title        = {{PIR} with compressed queries and amortized query processing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1142},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AngelCLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleS17,
  author       = {Robin Ankele and
                  Andrew Simpson},
  title        = {Privacy Games for Syntactic Privacy Notions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1126},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1126},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Anokhin17,
  author       = {Mikhail Anokhin},
  title        = {A Certain Family of Subgroups of {\textdollar}{\textbackslash}mathbb
                  Z{\_}n{\textbackslash}star{\textdollar} Is Weakly Pseudo-Free under
                  the General Integer Factoring Intractability Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1131},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Anokhin17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnshelAGG17,
  author       = {Iris Anshel and
                  Derek Atkins and
                  Dorian Goldfeld and
                  Paul E. Gunnells},
  title        = {WalnutDSA(TM): {A} Quantum Resistant Group Theoretic Digital Signature
                  Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnshelAGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnshelAGG17a,
  author       = {Iris Anshel and
                  Derek Atkins and
                  Dorian Goldfeld and
                  Paul E. Gunnells},
  title        = {Kayawood, a Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1162},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnshelAGG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoN17,
  author       = {Yoshinori Aono and
                  Phong Q. Nguyen},
  title        = {Random Sampling Revisited: Lattice Enumeration with Discrete Pruning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AponCEK17,
  author       = {Daniel Apon and
                  Chongwon Cho and
                  Karim Eldefrawy and
                  Jonathan Katz},
  title        = {Efficient, Reusable Fuzzy Extractors from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {755},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/755},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AponCEK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AponFL17,
  author       = {Daniel Apon and
                  Xiong Fan and
                  Feng{-}Hao Liu},
  title        = {Vector Encoding over Lattices and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AponFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Applebaum17,
  author       = {Benny Applebaum},
  title        = {Garbled Circuits as Randomized Encodings of Functions: a Primer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Applebaum17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumARV17,
  author       = {Benny Applebaum and
                  Barak Arkis and
                  Pavel Raykov and
                  Prashant Nalini Vasudevan},
  title        = {Conditional Disclosure of Secrets: Amplification, Closure, Amortization,
                  Lower-bounds, and Separations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumARV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumDINZ17,
  author       = {Benny Applebaum and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Michael Nielsen and
                  Lior Zichron},
  title        = {Secure Arithmetic Computation with Constant Computational Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumDINZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumHIKV17,
  author       = {Benny Applebaum and
                  Naama Haramaty and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Vinod Vaikuntanathan},
  title        = {Low-Complexity Cryptographic Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumHIKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AritaH17,
  author       = {Seiko Arita and
                  Sari Handa},
  title        = {Subring Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AritaH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBKL17,
  author       = {Frederik Armknecht and
                  Jens{-}Matthias Bohli and
                  Ghassan O. Karame and
                  Wenting Li},
  title        = {Sharding PoW-based Blockchains via Proofs of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1067},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasBPNR17,
  author       = {Victor Arribas and
                  Beg{\"{u}}l Bilgin and
                  George Petrides and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1193},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1193},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasBPNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasNR17,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {VerMI: Verification Tool for Masked Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1227},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovCNPRS17,
  author       = {Gilad Asharov and
                  T.{-}H. Hubert Chan and
                  Kartik Nayak and
                  Rafael Pass and
                  Ling Ren and
                  Elaine Shi},
  title        = {Oblivious Computation with Data Locality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovCNPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovDS0SSZ17,
  author       = {Gilad Asharov and
                  Daniel Demmler and
                  Michael Schapira and
                  Thomas Schneider and
                  Gil Segev and
                  Scott Shenker and
                  Michael Zohner},
  title        = {Privacy-Preserving Interdomain Routing at Internet Scale},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovDS0SSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovHLR17,
  author       = {Gilad Asharov and
                  Shai Halevi and
                  Yehuda Lindell and
                  Tal Rabin},
  title        = {Privacy-Preserving Search of Similar Patients in Genomic Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovHLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurBD17,
  author       = {Tomer Ashur and
                  Dani{\"{e}}l Bodden and
                  Orr Dunkelman},
  title        = {Linear Cryptanalysis Using Low-bias Linear Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurBD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurDL17,
  author       = {Tomer Ashur and
                  Orr Dunkelman and
                  Atul Luykx},
  title        = {Boosting Authenticated Encryption Robustness With Minimal Modifications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Attrapadung17,
  author       = {Nuttapong Attrapadung},
  title        = {Dual System Framework in Multilinear Settings and Applications to
                  Fully Secure (Compact) {ABE} for Unbounded-Size Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Attrapadung17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtzeiBLZ17,
  author       = {Nicola Atzei and
                  Massimo Bartoletti and
                  Stefano Lande and
                  Roberto Zunino},
  title        = {A formal model of Bitcoin transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1124},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtzeiBLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuerbachCFK17,
  author       = {Benedikt Auerbach and
                  David Cash and
                  Manuel Fersch and
                  Eike Kiltz},
  title        = {Memory-Tight Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuerbachCFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonE17,
  author       = {Jean{-}Philippe Aumasson and
                  Guillaume Endignoux},
  title        = {Clarifying the subset-resilience problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {909},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/909},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonE17a,
  author       = {Jean{-}Philippe Aumasson and
                  Guillaume Endignoux},
  title        = {Improving Stateless Hash-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {933},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/933},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonE17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineBGGLOR17,
  author       = {Gildas Avoine and
                  Xavier Bultel and
                  S{\'{e}}bastien Gambs and
                  David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Cristina Onete and
                  Jean{-}Marc Robert},
  title        = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvoineBGGLOR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaanBGRTTZ17,
  author       = {Hayo Baan and
                  Sauvik Bhattacharya and
                  {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
                  Ronald Rietman and
                  Ludo Tolhuizen and
                  Jose Luis Torre{-}Arce and
                  Zhenfei Zhang},
  title        = {Round2: {KEM} and {PKE} based on {GLWR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1183},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaanBGRTTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Badertscher0M17,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer},
  title        = {Strengthening Access Control Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Badertscher0M17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherM17,
  author       = {Christian Badertscher and
                  Ueli Maurer},
  title        = {Composable and Robust Outsourced Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherMTZ17,
  author       = {Christian Badertscher and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  title        = {Bitcoin as a Transaction Ledger: {A} Composable Treatment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherMTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananG17,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Aayush Jain and
                  Amit Sahai},
  title        = {A note on VRFs from Verifiable Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananG17a,
  author       = {Saikrishna Badrinarayanan and
                  Sanjam Garg and
                  Yuval Ishai and
                  Amit Sahai and
                  Akshay Wadia},
  title        = {Two-Message Witness Indistinguishability and Secure Computation in
                  the Plain Model from New Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/433},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananG17b,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Round Optimal Concurrent {MPC} via Strong Simulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/597},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananG17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananG17c,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Promise Zero Knowledge and its Applications to Round Optimal {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1088},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1088},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananG17c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananK17,
  author       = {Saikrishna Badrinarayanan and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  title        = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BajardEHMSZ17,
  author       = {Jean{-}Claude Bajard and
                  Julien Eynard and
                  M. Anwar Hasan and
                  Paulo Martins and
                  Leonel Sousa and
                  Vincent Zucca},
  title        = {Efficient reductions in cyclotomic rings - Application to {R-LWE}
                  based {FHE} schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BajardEHMSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschFGPS17,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Consolidating Inner Product Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1047},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschFGPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiCDLRSY17,
  author       = {Foteini Baldimtsi and
                  Jan Camenisch and
                  Maria Dubovitskaya and
                  Anna Lysyanskaya and
                  Leonid Reyzin and
                  Kai Samelin and
                  Sophia Yakoubov},
  title        = {Accumulators with Applications to Anonymity-Preserving Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiCDLRSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiKS17,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Katerina Samari},
  title        = {Watermarking Public-key Cryptographic Functionalities and Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/557},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKM17,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  title        = {Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees,
                  and Streaming Space-Bounded Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1061},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1061},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallRSV17,
  author       = {Marshall Ball and
                  Alon Rosen and
                  Manuel Sabin and
                  Prashant Nalini Vasudevan},
  title        = {Average-Case Fine-Grained Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/202},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallRSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallRSV17a,
  author       = {Marshall Ball and
                  Alon Rosen and
                  Manuel Sabin and
                  Prashant Nalini Vasudevan},
  title        = {Proofs of Useful Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BallRSV17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaloghES17,
  author       = {Marko Balogh and
                  Edward Eaton and
                  Fang Song},
  title        = {Quantum Collision-Finding in Non-Uniform Random Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {688},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/688},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaloghES17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalticoCFG17,
  author       = {Carmen Elisabetta Zaira Baltico and
                  Dario Catalano and
                  Dario Fiore and
                  Romain Gay},
  title        = {Practical Functional Encryption for Quadratic Functions with Applications
                  to Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/151},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalticoCFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanegasB17,
  author       = {Gustavo Banegas and
                  Daniel J. Bernstein},
  title        = {Low-communication parallel quantum multi-target preimage search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {789},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/789},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanegasB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanegasBBCDGGHK17,
  author       = {Gustavo Banegas and
                  Paulo S. L. M. Barreto and
                  Brice Odilon Boidje and
                  Pierre{-}Louis Cayrel and
                  Gilbert Ndollane Dione and
                  Kris Gaj and
                  Cheikh Thiecoumba Gueye and
                  Richard Haeussler and
                  Jean Belo Klamti and
                  Ousmane Ndiaye and
                  Duc Tri Nguyen and
                  Edoardo Persichetti and
                  Jefferson E. Ricardini},
  title        = {{DAGS:} Key Encapsulation using Dyadic {GS} Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1037},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanegasBBCDGGHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikBIJ17,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Takanori Isobe and
                  Martin Bjerregaard Jepsen},
  title        = {Analysis of Software Countermeasures for Whitebox Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikBIJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikI17,
  author       = {Subhadeep Banik and
                  Takanori Isobe},
  title        = {Some cryptanalytic results on Lizard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikPPSTS17,
  author       = {Subhadeep Banik and
                  Sumit Kumar Pandey and
                  Thomas Peyrin and
                  Siang Meng Sim and
                  Yosuke Todo and
                  Yu Sasaki},
  title        = {{GIFT:} {A} Small Present},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikPPSTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BansarkhaniK17,
  author       = {Rachid El Bansarkhani and
                  Ali {El Kaafarani}},
  title        = {Direct Anonymous Attestation from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1022},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BansarkhaniK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoW0G17,
  author       = {Zhenzhen Bao and
                  Lei Wang and
                  Jian Guo and
                  Dawu Gu},
  title        = {Functional Graph Revisited: Updates on (Second) Preimage Attacks on
                  Hash Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoW0G17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Barak17,
  author       = {Boaz Barak},
  title        = {The Complexity of Public-Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Barak17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakBKK17,
  author       = {Boaz Barak and
                  Zvika Brakerski and
                  Ilan Komargodski and
                  Pravesh K. Kothari},
  title        = {Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets
                  Program Obfuscation)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakBKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaCF17,
  author       = {Manuel Barbosa and
                  Dario Catalano and
                  Dario Fiore},
  title        = {Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing
                  of Outsourced Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/326},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbulescuD17,
  author       = {Razvan Barbulescu and
                  Sylvain Duquesne},
  title        = {Updating key size estimations for pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbulescuD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarnettSSSSVW17,
  author       = {Anthony Barnett and
                  Jay Santokhi and
                  Michael Simpson and
                  Nigel P. Smart and
                  Charlie Stainton{-}Bygrave and
                  Srinivas Vivek and
                  Adrian Waller},
  title        = {Image Classification using non-linear Support Vector Machines on Encrypted
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {857},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/857},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BarnettSSSSVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoDDMN17,
  author       = {Paulo S. L. M. Barreto and
                  Bernardo David and
                  Rafael Dowsley and
                  Kirill Morozov and
                  Anderson C. A. Nascimento},
  title        = {A Framework for Efficient Adaptively Secure Composable Oblivious Transfer
                  in the {ROM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {993},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoDDMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoGGMPST17,
  author       = {Paulo S. L. M. Barreto and
                  Shay Gueron and
                  Tim G{\"{u}}neysu and
                  Rafael Misoczki and
                  Edoardo Persichetti and
                  Nicolas Sendrier and
                  Jean{-}Pierre Tillich},
  title        = {{CAKE:} Code-based Algorithm for Key Encapsulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {757},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/757},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoGGMPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheDG17,
  author       = {Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir and
                  Benjamin Gr{\'{e}}goire},
  title        = {A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme
                  by Decreasing Randomness Complexity'},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1053},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheDG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheGL17,
  author       = {Gilles Barthe and
                  Benjamin Gr{\'{e}}goire and
                  Vincent Laporte},
  title        = {Provably secure compilation of side-channel countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1233},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartolettiLP17,
  author       = {Massimo Bartoletti and
                  Stefano Lande and
                  Alessandro Sebastian Podda},
  title        = {A Proof-of-Stake protocol for consensus on Bitcoin subchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartolettiLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarwellMOS17,
  author       = {Guy Barwell and
                  Daniel P. Martin and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Authenticated Encryption in the Face of Protocol and Side Channel
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarwellMOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BasinLS17,
  author       = {David A. Basin and
                  Andreas Lochbihler and
                  S. Reza Sefidgar},
  title        = {CryptHOL: Game-based Proofs in Higher-order Logic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BasinLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BattenY17,
  author       = {Lynn Batten and
                  Xun Yi},
  title        = {Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and
                  Change},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1220},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BattenY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauchBVLV17,
  author       = {Jens Bauch and
                  Daniel J. Bernstein and
                  Henry de Valence and
                  Tanja Lange and
                  Christine van Vredendaal},
  title        = {Short generators without quantum computers: the case of multiquadratics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauchBVLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumL17,
  author       = {Carsten Baum and
                  Vadim Lyubashevsky},
  title        = {Simple Amortized Proofs of Shortness for Linear Relations over Polynomial
                  Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {759},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/759},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeaulieuSSTWW17,
  author       = {Ray Beaulieu and
                  Douglas Shors and
                  Jason Smith and
                  Stefan Treatman{-}Clark and
                  Bryan Weeks and
                  Louis Wingers},
  title        = {Notes on the design and analysis of {SIMON} and {SPECK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeaulieuSSTWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BecerraIOS17,
  author       = {Jos{\'{e}} Becerra and
                  Vincenzo Iovino and
                  Dimiter Ostrev and
                  Marjan Skrobot},
  title        = {On the Relation Between {SIM} and IND-RoR Security Models for PAKEs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BecerraIOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BecerraIOSS17,
  author       = {Jos{\'{e}} Becerra and
                  Vincenzo Iovino and
                  Dimiter Ostrev and
                  Petra Sala and
                  Marjan Skrobot},
  title        = {Tightly-Secure {PAK(E)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1045},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BecerraIOSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BecerraSS17,
  author       = {Jos{\'{e}} Becerra and
                  Petra Sala and
                  Marjan Skrobot},
  title        = {An Offline Dictionary Attack against zkPAKE Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {961},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/961},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BecerraSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckCDKPSS17,
  author       = {Michael Till Beck and
                  Jan Camenisch and
                  David Derler and
                  Stephan Krenn and
                  Henrich C. P{\"{o}}hls and
                  Kai Samelin and
                  Daniel Slamanig},
  title        = {Practical Strongly Invisible and Strongly Accountable Sanitizable
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckCDKPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Becker17,
  author       = {Georg T. Becker},
  title        = {Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited:
                  Theory vs Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {493},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/493},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Becker17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerK17,
  author       = {Anja Becker and
                  Dusan Kostic},
  title        = {Speeding up lattice sieve with Xeon Phi coprocessor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BehniaOY17,
  author       = {Rouzbeh Behnia and
                  Muslum Ozgur Ozmen and
                  Attila A. Yavuz},
  title        = {Lattice-Based Public Key Encryption with Keyword Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1215},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BehniaOY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeierleCLR17,
  author       = {Christof Beierle and
                  Anne Canteaut and
                  Gregor Leander and
                  Yann Rotella},
  title        = {Proving Resistance against Invariant Attacks: How to Choose the Round
                  Constants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeierleCLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelFMP17,
  author       = {Amos Beimel and
                  Oriol Farr{\`{a}}s and
                  Yuval Mintz and
                  Naty Peter},
  title        = {Linear Secret-Sharing Schemes for Forbidden Graph Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {940},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/940},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelFMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelIK17,
  author       = {Amos Beimel and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Ad Hoc {PSM} Protocols: Secure Computation Without Coordination},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelIK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareH17,
  author       = {Mihir Bellare and
                  Viet Tung Hoang},
  title        = {Identity-Based Format-Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {877},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/877},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareOS17,
  author       = {Mihir Bellare and
                  Adam O'Neill and
                  Igors Stepanovs},
  title        = {Forward-Security under Continual Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-DavidS17,
  author       = {Shalev Ben{-}David and
                  Or Sattath},
  title        = {Quantum Tokens for Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-DavidS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-Efraim17,
  author       = {Aner Ben{-}Efraim},
  title        = {On Multiparty Garbling of Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1186},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-Efraim17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-EfraimLO17,
  author       = {Aner Ben{-}Efraim and
                  Yehuda Lindell and
                  Eran Omri},
  title        = {Efficient Scalable Constant-Round {MPC} via Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {862},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/862},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-EfraimLO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenarrochBL17,
  author       = {Daniel Benarroch and
                  Zvika Brakerski and
                  Tancr{\`{e}}de Lepoint},
  title        = {{FHE} Over the Integers: Decomposed and Batched in the Post-Quantum
                  Regime},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenarrochBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenedettiTF17,
  author       = {L{\'{e}}onard Benedetti and
                  Aur{\'{e}}lien Thierry and
                  Julien Francq},
  title        = {Detection of cryptographic algorithms with grap},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1119},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenedettiTF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaBDQ17,
  author       = {Fabrice Benhamouda and
                  Olivier Blazy and
                  L{\'{e}}o Ducas and
                  Willy Quach},
  title        = {Hash Proof Systems over Lattices Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {997},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/997},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaBDQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaBL17,
  author       = {Fabrice Benhamouda and
                  Florian Bourse and
                  Helger Lipmaa},
  title        = {CCA-Secure Inner-Product Functional Encryption from Projective Hash
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaFGN17,
  author       = {Fabrice Benhamouda and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Non-Interactive Provably Secure Attestations for Arbitrary {RSA} Prime
                  Generation Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/640},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaFGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaKR17,
  author       = {Fabrice Benhamouda and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Robust Non-Interactive Multiparty Computation Against Constant-Size
                  Collusion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/555},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaL17,
  author       = {Fabrice Benhamouda and
                  Huijia Lin},
  title        = {k-Round {MPC} from k-Round {OT} via Garbled Interactive Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1125},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BentovHMN17,
  author       = {Iddo Bentov and
                  Pavel Hub{\'{a}}cek and
                  Tal Moran and
                  Asaf Nadler},
  title        = {Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible,
                  Scalable Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BentovHMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BentovJZLZBDJ17,
  author       = {Iddo Bentov and
                  Yan Ji and
                  Fan Zhang and
                  Yunqi Li and
                  Xueyuan Zhao and
                  Lorenz Breidenbach and
                  Philip Daian and
                  Ari Juels},
  title        = {Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1153},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1153},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BentovJZLZBDJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BentovKM17,
  author       = {Iddo Bentov and
                  Ranjit Kumaresan and
                  Andrew Miller},
  title        = {Instantaneous Decentralized Poker},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {875},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/875},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BentovKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BerendJB17,
  author       = {David Berend and
                  Bernhard Jungk and
                  Shivam Bhasin},
  title        = {There Goes Your {PIN:} Exploiting Smartphone Sensor Fusion Under Single
                  and Cross User Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1169},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BerendJB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BermanDRV17,
  author       = {Itay Berman and
                  Akshay Degwekar and
                  Ron D. Rothblum and
                  Prashant Nalini Vasudevan},
  title        = {Multi Collision Resistant Hash Functions and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BermanDRV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BermanRV17,
  author       = {Itay Berman and
                  Ron D. Rothblum and
                  Vinod Vaikuntanathan},
  title        = {Zero-Knowledge Proofs of Proximity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BermanRV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Berners-Lee17,
  author       = {Ela Lee},
  title        = {Improved Security Notions for Proxy Re-Encryption to Enforce Access
                  Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {824},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/824},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Berners-Lee17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinB0P17,
  author       = {Daniel J. Bernstein and
                  Leon Groot Bruinderink and
                  Tanja Lange and
                  Lorenz Panny},
  title        = {{HILA5} Pindakaas: On the {CCA} security of lattice-based encryption
                  with error correction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1214},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinB0P17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBGBHLV17,
  author       = {Daniel J. Bernstein and
                  Joachim Breitner and
                  Daniel Genkin and
                  Leon Groot Bruinderink and
                  Nadia Heninger and
                  Tanja Lange and
                  Christine van Vredendaal and
                  Yuval Yarom},
  title        = {Sliding right into disaster: Left-to-right sliding windows leak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBGBHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBM17,
  author       = {Daniel J. Bernstein and
                  Jean{-}Fran{\c{c}}ois Biasse and
                  Michele Mosca},
  title        = {A low-resource quantum factoring algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCL17,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange},
  title        = {Double-base scalar multiplication revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinHLV17,
  author       = {Daniel J. Bernstein and
                  Nadia Heninger and
                  Paul Lou and
                  Luke Valenta},
  title        = {Post-quantum {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinKLMMNS17,
  author       = {Daniel J. Bernstein and
                  Stefan K{\"{o}}lbl and
                  Stefan Lucks and
                  Pedro Maat Costa Massolino and
                  Florian Mendel and
                  Kashif Nawaz and
                  Tobias Schneider and
                  Peter Schwabe and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yosuke Todo and
                  Beno{\^{\i}}t Viguier},
  title        = {Gimli: a cross-platform permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinKLMMNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL17,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Montgomery curves and the Montgomery ladder},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL17a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Post-quantum cryptography - dealing with the fallout of physics success},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinY17,
  author       = {Daniel J. Bernstein and
                  Bo{-}Yin Yang},
  title        = {Asymptotically faster quantum algorithms to solve multivariate quadratic
                  equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1206},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BessonovGS17,
  author       = {Mariya Bessonov and
                  Dima Grigoriev and
                  Vladimir Shpilrain},
  title        = {Probabilistic solution of Yao's millionaires' problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1129},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BessonovGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeullensP17,
  author       = {Ward Beullens and
                  Bart Preneel},
  title        = {Field lifting for smaller {UOV} public keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {776},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/776},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeullensP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauCGN17,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {On the Hardness of the Mersenne Low Hamming Ratio Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauCGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauFGN17,
  author       = {Marc Beunardeau and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Honey Encryption for Language},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauFGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhandariC17,
  author       = {Anindya Shankar Bhandari and
                  Dipanwita Roy Chowdhury},
  title        = {{ZETA:} Towards Tagless Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhandariC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacharyaGRT17,
  author       = {Sauvik Bhattacharya and
                  {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
                  Ronald Rietman and
                  Ludo Tolhuizen},
  title        = {spKEX: An optimized lattice-based key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {709},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/709},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacharyaGRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacharyaMBM17,
  author       = {Sarani Bhattacharya and
                  Cl{\'{e}}mentine Maurice and
                  Shivam Bhasin and
                  Debdeep Mukhopadhyay},
  title        = {Template Attack on Blinded Scalar Multiplication with Asynchronous
                  perf-ioctl Calls},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {968},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/968},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacharyaMBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacherjeeS17,
  author       = {Sanjay Bhattacherjee and
                  Palash Sarkar},
  title        = {Cryptocurrency Voting Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1167},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacherjeeS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikDDMN17,
  author       = {Ritam Bhaumik and
                  Nilanjan Datta and
                  Avijit Dutta and
                  Nicky Mouha and
                  Mridul Nandi},
  title        = {The Iterated Random Function Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {892},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/892},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikDDMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikN17,
  author       = {Ritam Bhaumik and
                  Mridul Nandi},
  title        = {Improved Security for {OCB3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiLDLW17,
  author       = {Wenquan Bi and
                  Zheng Li and
                  Xiaoyang Dong and
                  Lu Li and
                  Xiaoyun Wang},
  title        = {Conditional Cube Attack on Round-Reduced River Keyak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1012},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiLDLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiancoG17,
  author       = {Giulia Bianco and
                  Elisa Gorla},
  title        = {Scalar multiplication in compressed coordinates in the trace-zero
                  subgroup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {884},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/884},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiancoG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiancoG17a,
  author       = {Giulia Bianco and
                  Elisa Gorla},
  title        = {Compression for trace zero points on twisted Edwards curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {886},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/886},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiancoG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiasseEFGK17,
  author       = {Jean{-}Fran{\c{c}}ois Biasse and
                  Thomas Espitau and
                  Pierre{-}Alain Fouque and
                  Alexandre G{\'{e}}lin and
                  Paul Kirchner},
  title        = {Computing generator in cyclotomic integer rings, {A} subfield algorithm
                  for the Principal Ideal Problem in {L(1/2)} and application to cryptanalysis
                  of a {FHE} scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiasseEFGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BicerBKL17,
  author       = {Osman Bi{\c{c}}er and
                  Muhammed Ali Bing{\"{o}}l and
                  Mehmet Sabir Kiraz and
                  Albert Levi},
  title        = {Towards Practical {PFE:} An Efficient 2-Party Private Function Evaluation
                  Protocol Based on Half Gates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BicerBKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindelBKMSW17,
  author       = {Nina Bindel and
                  Johannes Buchmann and
                  Juliane Kr{\"{a}}mer and
                  Heiko Mantel and
                  Johannes Schickel and
                  Alexandra Weber},
  title        = {Bounding the cache-side-channel leakage of lattice-based signature
                  schemes using program semantics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {951},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/951},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BindelBKMSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindelHMS17,
  author       = {Nina Bindel and
                  Udyani Herath and
                  Matthew McKague and
                  Douglas Stebila},
  title        = {Transitioning to a Quantum-Resistant Public Key Infrastructure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BindelHMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindschaedlerGC17,
  author       = {Vincent Bindschaedler and
                  Paul Grubbs and
                  David Cash and
                  Thomas Ristenpart and
                  Vitaly Shmatikov},
  title        = {The Tao of Inference in Privacy-Protected Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1078},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BindschaedlerGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovFK17,
  author       = {Alex Biryukov and
                  Daniel Feher and
                  Dmitry Khovratovich},
  title        = {Guru: Universal Reputation Module for Distributed Consensus Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/671},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovP17,
  author       = {Alex Biryukov and
                  L{\'{e}}o Perrin},
  title        = {Symmetrically and Asymmetrically Hard Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovP17a,
  author       = {Alex Biryukov and
                  L{\'{e}}o Perrin},
  title        = {State of the Art in Lightweight Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovUV17,
  author       = {Alex Biryukov and
                  Aleksei Udovenko and
                  Vesselin Velichkov},
  title        = {Analysis of the {NORX} Core Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovUV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bitansky17,
  author       = {Nir Bitansky},
  title        = {Verifiable Random Functions from Non-Interactive Witness-Indistinguishable
                  Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bitansky17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyKP17,
  author       = {Nir Bitansky and
                  Yael Tauman Kalai and
                  Omer Paneth},
  title        = {Multi-Collision Resistance: {A} Paradigm for Keyless Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackthorneKFY17,
  author       = {Jeremy Blackthorne and
                  Benjamin Kaiser and
                  Benjamin Fuller and
                  B{\"{u}}lent Yener},
  title        = {Environmental Authentication in Malware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/928},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackthorneKFY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassK17,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  title        = {Strain: {A} Secure Auction for Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1044},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassN17,
  author       = {Erik{-}Oliver Blass and
                  Guevara Noubir},
  title        = {Secure Logging with Crash Tolerance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyCG17,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  Paul Germouty},
  title        = {Almost Optimal Oblivious Transfer from {QA-NIZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockiZ17,
  author       = {Jeremiah Blocki and
                  Samson Zhou},
  title        = {On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockiZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BloemGIKMW17,
  author       = {Roderick Bloem and
                  Hannes Gro{\ss} and
                  Rinat Iusupov and
                  Bettina K{\"{o}}nighofer and
                  Stefan Mangard and
                  Johannes Winter},
  title        = {Formal Verification of Masked Hardware Implementations in the Presence
                  of Glitches},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {897},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/897},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BloemGIKMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlomerL17,
  author       = {Johannes Bl{\"{o}}mer and
                  Gennadij Liske},
  title        = {Subtleties in Security Definitions for Predicate Encryption with Public
                  Index},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlomerL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauCS17,
  author       = {C{\'{e}}line Blondeau and
                  Roberto Civino and
                  Massimiliano Sala},
  title        = {Differential Attacks: Using Alternative Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockSY17,
  author       = {Hanno B{\"{o}}ck and
                  Juraj Somorovsky and
                  Craig Young},
  title        = {Return Of Bleichenbacher's Oracle Threat {(ROBOT)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1189},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BockSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoerDJW17,
  author       = {Koen de Boer and
                  L{\'{e}}o Ducas and
                  Stacey Jeffery and
                  Ronald de Wolf},
  title        = {Attacks on the {AJPS} Mersenne-based cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1171},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoerDJW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovR17,
  author       = {Andrej Bogdanov and
                  Alon Rosen},
  title        = {Pseudorandom Functions: Three Decades Later},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/652},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovV17,
  author       = {Andrey Bogdanov and
                  Philip S. Vejre},
  title        = {Linear Cryptanalysis of {DES} with Asymmetries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {895},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/895},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaCDP17,
  author       = {Alexandra Boldyreva and
                  Shan Chen and
                  Pierre{-}Alain Dupont and
                  David Pointcheval},
  title        = {Human Computing for Handling Strong Corruptions in Authenticated Key
                  Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaCDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaPS17,
  author       = {Alexandra Boldyreva and
                  Christopher Patton and
                  Thomas Shrimpton},
  title        = {Hedging Public-Key Encryption in the Real World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {510},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/510},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonawitzIKMMPRS17,
  author       = {Kallista A. Bonawitz and
                  Vladimir Ivanov and
                  Ben Kreuter and
                  Antonio Marcedone and
                  H. Brendan McMahan and
                  Sarvar Patel and
                  Daniel Ramage and
                  Aaron Segal and
                  Karn Seth},
  title        = {Practical Secure Aggregation for Privacy Preserving Machine Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/281},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonawitzIKMMPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGGJKRS17,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Aayush Jain and
                  Sam Kim and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  title        = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/956},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGGJKRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGGK17,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Sam Kim},
  title        = {A Lattice-Based Universal Thresholdizer for Cryptographic Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehISW17,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  title        = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/240},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehISW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehKM17,
  author       = {Dan Boneh and
                  Sam Kim and
                  Hart William Montgomery},
  title        = {Private Puncturable PRFs From Standard Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehKW17,
  author       = {Dan Boneh and
                  Sam Kim and
                  David J. Wu},
  title        = {Constrained Keys for Invertible Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/477},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bonnetain17,
  author       = {Xavier Bonnetain},
  title        = {Quantum Key-Recovery on full {AEZ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {767},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/767},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bonnetain17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnoronDF17,
  author       = {Guillaume Bonnoron and
                  L{\'{e}}o Ducas and
                  Max Fillinger},
  title        = {Large {FHE} gates from Tensored Homomorphic Accumulator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/996},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnoronDF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonteBBCIV17,
  author       = {Charlotte Bonte and
                  Carl Bootland and
                  Joppe W. Bos and
                  Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  title        = {Faster Homomorphic Function Evaluation using Non-Integral Base Encoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonteBBCIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonteMASMV17,
  author       = {Charlotte Bonte and
                  Eleftheria Makri and
                  Amin Ardeshirdavani and
                  Jaak Simm and
                  Yves Moreau and
                  Frederik Vercauteren},
  title        = {Privacy-Preserving Genome-Wide Association Study is Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {955},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/955},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonteMASMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleCGGHJ17,
  author       = {Jonathan Bootle and
                  Andrea Cerulli and
                  Essam Ghadafi and
                  Jens Groth and
                  Mohammad Hajiabadi and
                  Sune K. Jakobsen},
  title        = {Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/872},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleCGGHJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleT17,
  author       = {Jonathan Bootle and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of Compact-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {742},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/742},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorgesPFP17,
  author       = {Mateus Borges and
                  Quoc{-}Sang Phan and
                  Antonio Filieri and
                  Corina S. Pasareanu},
  title        = {Model-counting Approaches For Nonlinear Numerical Constraints},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorgesPFP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorissovBT17,
  author       = {Yuri L. Borissov and
                  Peter G. Boyvalenkov and
                  Robert Tsenkov},
  title        = {On a Linear Cryptanalysis of a Family of Modified {DES} Ciphers with
                  Even Weight S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/089},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorissovBT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosDKLLSSS17,
  author       = {Joppe W. Bos and
                  L{\'{e}}o Ducas and
                  Eike Kiltz and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky and
                  John M. Schanck and
                  Peter Schwabe and
                  Damien Stehl{\'{e}}},
  title        = {{CRYSTALS} - Kyber: a CCA-secure module-lattice-based {KEM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosDKLLSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosHMMGT17,
  author       = {Joppe W. Bos and
                  Charles Hubain and
                  Wil Michiels and
                  Cristofaro Mune and
                  Eloi Sanfelix Gonzalez and
                  Philippe Teuwen},
  title        = {White-Box Cryptography: Don't Forget About Grey Box Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosHMMGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosM17,
  author       = {Joppe W. Bos and
                  Peter L. Montgomery},
  title        = {Montgomery Arithmetic from a Software Perspective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoschiniCN17,
  author       = {Cecilia Boschini and
                  Jan Camenisch and
                  Gregory Neven},
  title        = {Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1123},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoschiniCN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BostF17,
  author       = {Raphael Bost and
                  Pierre{-}Alain Fouque},
  title        = {Thwarting Leakage Abuse Attacks against Searchable Encryption - {A}
                  Formal Approach and Applications to Database Padding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1060},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BostF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BostMO17,
  author       = {Raphael Bost and
                  Brice Minaud and
                  Olga Ohrimenko},
  title        = {Forward and Backward Private Searchable Encryption from Constrained
                  Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {805},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/805},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BostMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Both017,
  author       = {Leif Both and
                  Alexander May},
  title        = {Decoding Linear Codes with High Error Rate and its Impact for {LPN}
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1139},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Both017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BothM17,
  author       = {Leif Both and
                  Alexander May},
  title        = {The Approximate k-List Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BothM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudabraN17,
  author       = {Maher Boudabra and
                  Abderrahmane Nitaj},
  title        = {A New Generalization of the {KMOV} Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1077},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudabraN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boudot17,
  author       = {Fabrice Boudot},
  title        = {On Improving Integer Factorization and Discrete Logarithm Computation
                  using Partial Triangulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {758},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/758},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boudot17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraCGJPP17,
  author       = {Christina Boura and
                  Ilaria Chillotti and
                  Nicolas Gama and
                  Dimitar Jetchev and
                  Stanislav Peceny and
                  Alexander Petric},
  title        = {High-Precision Privacy-Preserving Real-Valued Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1234},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraCGJPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoureanuG0O17,
  author       = {Ioana Boureanu and
                  David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Cristina Onete},
  title        = {Breaking and Fixing the {HB+DB} protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/416},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoureanuG0O17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BourseMMP17,
  author       = {Florian Bourse and
                  Michele Minelli and
                  Matthias Minihold and
                  Pascal Paillier},
  title        = {Fast Homomorphic Evaluation of Deep Discretized Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1114},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BourseMMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoweGG17,
  author       = {Sean Bowe and
                  Ariel Gabizon and
                  Matthew D. Green},
  title        = {A multi-party protocol for constructing the public parameters of the
                  Pinocchio zk-SNARK},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoweGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoweGM17,
  author       = {Sean Bowe and
                  Ariel Gabizon and
                  Ian Miers},
  title        = {Scalable Multi-party Computation for zk-SNARK Parameters in the Random
                  Beacon Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1050},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoweGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydBCH17,
  author       = {Colin Boyd and
                  Xavier Boyen and
                  Christopher Carr and
                  Thomas Haines},
  title        = {Key Recovery: Inert and Public},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydBCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydDGTR17,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani and
                  H{\aa}vard Raddum},
  title        = {Security notions for cloud storage and deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1208},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydDGTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydH17,
  author       = {Colin Boyd and
                  Britta Hale},
  title        = {Secure Channels and Termination: The Last Word on {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {784},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/784},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenL17,
  author       = {Xavier Boyen and
                  Qinyi Li},
  title        = {All-But-Many Lossy Trapdoor Functions from Lattices and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGI17,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Group-Based Secure Computation: Optimizing Rounds, Communication,
                  and Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGILT17,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Huijia Lin and
                  Stefano Tessaro},
  title        = {Foundations of Homomorphic Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1248},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGILT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleIPW17,
  author       = {Elette Boyle and
                  Yuval Ishai and
                  Rafael Pass and
                  Mary Wootters},
  title        = {Can We Access a Database Both Locally and Privately?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleIPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleKRS17,
  author       = {Elette Boyle and
                  Saleet Klein and
                  Alon Rosen and
                  Gil Segev},
  title        = {Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleKRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiHP17,
  author       = {Zvika Brakerski and
                  Shai Halevi and
                  Antigoni Polychroniadou},
  title        = {Four Round Secure Computation without Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiHP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiJKPW17,
  author       = {Zvika Brakerski and
                  Aayush Jain and
                  Ilan Komargodski and
                  Alain Passel{\`{e}}gue and
                  Daniel Wichs},
  title        = {Non-Trivial Witness Encryption and Null-iO from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {874},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/874},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiJKPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiKP17,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Renen Perlman},
  title        = {Succinct Spooky Free Compilers Are Not Black Box Sound},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/887},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiLSV17,
  author       = {Zvika Brakerski and
                  Alex Lombardi and
                  Gil Segev and
                  Vinod Vaikuntanathan},
  title        = {Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {967},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/967},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiLSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiTVW17,
  author       = {Zvika Brakerski and
                  Rotem Tsabary and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  title        = {Private Constrained PRFs (and More) from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {795},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/795},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiTVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BranniganSOVOGR17,
  author       = {S{\'{e}}amus Brannigan and
                  Neil Smyth and
                  Tobias Oder and
                  Felipe Valencia and
                  Elizabeth O'Sullivan and
                  Tim G{\"{u}}neysu and
                  Francesco Regazzoni},
  title        = {An Investigation of Sources of Randomness Within Discrete Gaussian
                  Sampling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BranniganSOVOGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreidenbachDTJ17,
  author       = {Lorenz Breidenbach and
                  Philip Daian and
                  Florian Tram{\`{e}}r and
                  Ari Juels},
  title        = {Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant
                  Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1090},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1090},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreidenbachDTJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreierH17,
  author       = {Jakub Breier and
                  Xiaolu Hou},
  title        = {Fault Attacks Made Easy: Differential Fault Analysis Automation on
                  Assembly Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {829},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/829},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreierH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreierJB17,
  author       = {Jakub Breier and
                  Dirmanto Jap and
                  Shivam Bhasin},
  title        = {{SCADPA:} Side-Channel Assisted Differential-Plaintext Attack on Bit
                  Permutation Based Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1166},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreierJB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelD17,
  author       = {Jacqueline Brendel and
                  Denise Demirel},
  title        = {Efficient Proactive Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/719},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelF0J17,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson},
  title        = {{PRF-ODH:} Relations, Instantiations, and Impossibility Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelF0J17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelF17,
  author       = {Jacqueline Brendel and
                  Marc Fischlin},
  title        = {Zero Round-Trip Time for the Extended Access Control Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelFG17,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther},
  title        = {Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope
                  and {TLS} 1.3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1252},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Breuer17,
  author       = {Peter T. Breuer},
  title        = {An Obfuscating Compiler},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Breuer17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierGN17,
  author       = {Eric Brier and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Exploring Naccache-Stern Knapsack Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadnaxFMR17,
  author       = {Brandon Broadnax and
                  Valerie Fetzer and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Andy Rupp},
  title        = {Non-Malleability vs. CCA-Security: The Case of Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1069},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1069},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadnaxFMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaJ17,
  author       = {Chris Brzuska and
                  H{\aa}kon Jacobsen},
  title        = {A Modular Security Analysis of {EAP} and {IEEE} 802.11},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannBGKKMSV17,
  author       = {Johannes Buchmann and
                  Niklas B{\"{u}}scher and
                  Florian G{\"{o}}pfert and
                  Stefan Katzenbeisser and
                  Juliane Kr{\"{a}}mer and
                  Daniele Micciancio and
                  Sander Siim and
                  Christine van Vredendaal and
                  Michael Walter},
  title        = {Creating Cryptographic Challenges Using Multi-Party Computation: The
                  {LWE} Challenge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/606},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannBGKKMSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannDSS17,
  author       = {Johannes Buchmann and
                  Denise Demirel and
                  Lucas Schabh{\"{u}}ser and
                  Patrick Struck},
  title        = {Linearly Homomorphic Authenticated Encryption with Provable Correctness
                  and Public Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {700},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/700},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannDSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudroniP17,
  author       = {Alessandro Budroni and
                  Federico Pintore},
  title        = {Efficient hash maps to {\unicode{54590}}\({}_{\mbox{2}}\) on {BLS}
                  curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudroniP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuldasGB17,
  author       = {Ahto Buldas and
                  Matthias Geihs and
                  Johannes Buchmann},
  title        = {Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/754},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuldasGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BultelDGGGL17,
  author       = {Xavier Bultel and
                  Manik Lal Das and
                  Hardik Gajera and
                  David G{\'{e}}rault and
                  Matthieu Giraud and
                  Pascal Lafourcade},
  title        = {Verifiable Private Polynomial Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {756},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/756},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BultelDGGGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BultelL17,
  author       = {Xavier Bultel and
                  Pascal Lafourcade},
  title        = {Zero-Knowledge Proxy Re-Identification Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BultelL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BultelL17a,
  author       = {Xavier Bultel and
                  Pascal Lafourcade},
  title        = {Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable
                  Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BultelL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BunderNST17,
  author       = {Martin W. Bunder and
                  Abderrahmane Nitaj and
                  Willy Susilo and
                  Joseph Tonien},
  title        = {A generalized attack on {RSA} type cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1076},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BunderNST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BunzBBPWM17,
  author       = {Benedikt B{\"{u}}nz and
                  Jonathan Bootle and
                  Dan Boneh and
                  Andrew Poelstra and
                  Pieter Wuille and
                  Gregory Maxwell},
  title        = {Bulletproofs: Short Proofs for Confidential Transactions and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1066},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BunzBBPWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurnsMRSV17,
  author       = {Jonathan Burns and
                  Daniel Moore and
                  Katrina Ray and
                  Ryan Speers and
                  Brian Vohaska},
  title        = {{EC-OPRF:} Oblivious Pseudorandom Functions using Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurnsMRSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ByaliPRS17,
  author       = {Megha Byali and
                  Arpita Patra and
                  Divya Ravi and
                  Pratik Sarkar},
  title        = {Fast and Universally-Composable Oblivious Transfer and Commitment
                  Scheme with Adaptive Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1165},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ByaliPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CVGM17,
  author       = {Ashokkumar C. and
                  M. Bhargav Sri Venkatesh and
                  Ravi Prakash Giri and
                  Bernard Menezes},
  title        = {Design, Implementation and Performance Analysis of Highly Efficient
                  Algorithms for {AES} Key Retrieval in Access-driven Cache-based Side
                  Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {896},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/896},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CVGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinCFL17,
  author       = {Christian Cachin and
                  Jan Camenisch and
                  Eduarda Freire{-}Stoegbuchner and
                  Anja Lehmann},
  title        = {Updatable Tokenization: Formal Definitions and Provably Secure Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinCFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinCMTV17,
  author       = {Christian Cachin and
                  Angelo De Caro and
                  Pedro Moreno{-}Sanchez and
                  Bj{\"{o}}rn Tackmann and
                  Marko Vukolic},
  title        = {The Transaction Graph for Modeling Blockchain Semantics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1070},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1070},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinCMTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinGPT17,
  author       = {Christian Cachin and
                  Esha Ghosh and
                  Dimitrios Papadopoulos and
                  Bj{\"{o}}rn Tackmann},
  title        = {Stateful Multi-Client Verifiable Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {901},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/901},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinGPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CagliDP17,
  author       = {Eleonora Cagli and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  title        = {Convolutional Neural Networks with Data Augmentation against Jitter-Based
                  Countermeasures - Profiling Attacks without Pre-Processing -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {740},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/740},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CagliDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamachoK17,
  author       = {Philippe Camacho and
                  Fernando Krell},
  title        = {Asynchronous provably-secure hidden services},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {888},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/888},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamachoK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCDLNU17,
  author       = {Jan Camenisch and
                  Liqun Chen and
                  Manu Drijvers and
                  Anja Lehmann and
                  David Novick and
                  Rainer Urian},
  title        = {One {TPM} to Bind Them All: Fixing {TPM} 2.0 for Provably Secure Anonymous
                  Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/639},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischCDLNU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDKPSS17,
  author       = {Jan Camenisch and
                  David Derler and
                  Stephan Krenn and
                  Henrich C. P{\"{o}}hls and
                  Kai Samelin and
                  Daniel Slamanig},
  title        = {Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible
                  Sanitizable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDKPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDL17,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Anja Lehmann},
  title        = {Anonymous Attestation with Subverted TPMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischL17,
  author       = {Jan Camenisch and
                  Anja Lehmann},
  title        = {Privacy for Distributed Databases via (Un)linkable Pseudonyms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaminataG17,
  author       = {Alessio Caminata and
                  Elisa Gorla},
  title        = {Solving Multivariate Polynomial Systems and an Invariant from Commutative
                  Algebra},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {593},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/593},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaminataG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CampanelliGGN17,
  author       = {Matteo Campanelli and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Luca Nizzardo},
  title        = {Zero-Knowledge Contingent Payments Revisited: Attacks and Payments
                  for Services},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CampanelliGGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardCKS17,
  author       = {S{\'{e}}bastien Canard and
                  Sergiu Carpov and
                  Donald Nokam Kuate and
                  Renaud Sirdey},
  title        = {Running compression algorithms in the encrypted domain: a case-study
                  on the homomorphic execution of {RLE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardCKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiC17,
  author       = {Ran Canetti and
                  Yilei Chen},
  title        = {Constraint-hiding Constrained PRFs for {NC1} from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/143},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiHMV17,
  author       = {Ran Canetti and
                  Kyle Hogan and
                  Aanchal Malhotra and
                  Mayank Varia},
  title        = {A Universally Composable Treatment of Network Time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1256},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiHMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiHR17,
  author       = {Ran Canetti and
                  Justin Holmgren and
                  Silas Richelson},
  title        = {Towards Doubly Efficient Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {568},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/568},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiHR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiL17,
  author       = {Ran Canetti and
                  Amit Lichtenberg},
  title        = {Certifying Trapdoor Permutations, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/631},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautLNRSS17,
  author       = {Anne Canteaut and
                  Eran Lambooij and
                  Samuel Neves and
                  Shahram Rasoolzadeh and
                  Yu Sasaki and
                  Marc Stevens},
  title        = {Refined Probability of Differential Characteristics Including Dependency
                  Between Multiple Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/478},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautLNRSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet17,
  author       = {Claude Carlet},
  title        = {Characterizations of the differential uniformity of vectorial functions
                  by the Walsh transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {516},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/516},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet17a,
  author       = {Claude Carlet},
  title        = {Componentwise APNness, Walsh uniformity of {APN} functions and cyclic-additive
                  difference sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletMR17,
  author       = {Claude Carlet and
                  Pierrick M{\'{e}}aux and
                  Yann Rotella},
  title        = {Boolean functions with restricted input and their robustness; application
                  to the {FLIP} cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletP17,
  author       = {Claude Carlet and
                  Stjepan Picek},
  title        = {On the exponents of {APN} power functions and Sidon sets, sum-free
                  sets, and Dickson polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1179},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarmerM017,
  author       = {Brent Carmer and
                  Alex J. Malozemoff and
                  Mariana Raykova},
  title        = {5Gen-C: Multi-input Functional Encryption and Program Obfuscation
                  for Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {826},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/826},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarmerM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarmonSW17,
  author       = {Elad Carmon and
                  Jean{-}Pierre Seifert and
                  Avishai Wool},
  title        = {Photonic Side Channel Attacks Against {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarmonSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpentRT17,
  author       = {Xavier Carpent and
                  Norrathep Rattanavipanon and
                  Gene Tsudik},
  title        = {Probabilistic and Considerate Attestation of IoT Devices against Roving
                  Malware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1216},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpentRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpovAS17,
  author       = {Sergiu Carpov and
                  Pascal Aubry and
                  Renaud Sirdey},
  title        = {A multi-start heuristic for multiplicative depth minimization of boolean
                  circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpovAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CartorS17,
  author       = {Ryann Cartor and
                  Daniel Smith{-}Tone},
  title        = {{EFLASH:} {A} New Multivariate Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1184},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CartorS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoD17,
  author       = {Ignacio Cascudo and
                  Bernardo David},
  title        = {{SCRAPE:} Scalable Randomness Attested by Public Entities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDFR17,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Oriol Farr{\`{a}}s and
                  Samuel Ranellucci},
  title        = {Resource-efficient {OT} combiners with active security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDFR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashZ17,
  author       = {David Cash and
                  Cong Zhang},
  title        = {A Ciphertext-Size Lower Bound for Order-Preserving Encryption with
                  Limited Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1120},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastagnosIL17,
  author       = {Guilhem Castagnos and
                  Laurent Imbert and
                  Fabien Laguillaumie},
  title        = {Encryption Switching Protocols Revisited: Switching modulo p},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastagnosIL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Castro17,
  author       = {Alexandre de Castro},
  title        = {Quantum one-way permutation over the finite field of two elements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Castro17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Castro17a,
  author       = {Alexandre de Castro},
  title        = {Controlled-NOT function can provoke biased interpretation from Bell's
                  test experiments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/681},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Castro17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastryckIV17,
  author       = {Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  title        = {Homomorphic SIM\({}^{\mbox{2}}\)D Operations: Single Instruction Much
                  More Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1013},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastryckIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CathebrasCSV17,
  author       = {Jo{\"{e}}l Cath{\'{e}}bras and
                  Alexandre Carbon and
                  Renaud Sirdey and
                  Nicolas Ventroux},
  title        = {An Analysis of {FV} Parameters Impact Towards its Hardware Acceleration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CathebrasCSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CauchoisGL17,
  author       = {Victor Cauchois and
                  Cl{\'{e}}ment Gomez and
                  Reynald Lercier},
  title        = {Generalized Distinguishing Attack: {A} New Cryptanalysis of AES-like
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CauchoisGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cavanaugh17,
  author       = {Steven Cavanaugh},
  title        = {A General Degenerate Grouping Power Attack with Specific Application
                  to {SIMON} and {SPECK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cavanaugh17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CecchettiZJKJS17,
  author       = {Ethan Cecchetti and
                  Fan Zhang and
                  Yan Ji and
                  Ahmed E. Kosba and
                  Ari Juels and
                  Elaine Shi},
  title        = {Solidus: Confidential Distributed Ledger Transactions via {PVORM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/317},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CecchettiZJKJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CetinCLLRX17,
  author       = {Gizem S. {\c{C}}etin and
                  Hao Chen and
                  Kim Laine and
                  Kristin E. Lauter and
                  Peter Rindal and
                  Yuhou Xia},
  title        = {Private Queries on Encrypted Genomic Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CetinCLLRX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChMV17,
  author       = {Srikanth Ch and
                  C. E. Veni Madhavan and
                  Kumar Swamy H. V.},
  title        = {Family of PRGs based on Collections of Arithmetic Progressions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChabanneKM17,
  author       = {Herv{\'{e}} Chabanne and
                  Julien Keuffer and
                  Refik Molva},
  title        = {Embedded Proofs for Verifiable Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1038},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChabanneKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChabanneMP17,
  author       = {Herv{\'{e}} Chabanne and
                  Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {Linear Repairing Codes and Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {918},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/918},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChabanneMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChabanneWMMP17,
  author       = {Herv{\'{e}} Chabanne and
                  Amaury de Wargny and
                  Jonathan Milgram and
                  Constance Morel and
                  Emmanuel Prouff},
  title        = {Privacy-Preserving Classification on Deep Neural Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChabanneWMMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosC17,
  author       = {Pyrros Chaidos and
                  Geoffroy Couteau},
  title        = {Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs
                  of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1029},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaidosC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaillouxD17,
  author       = {Andr{\'{e}} Chailloux and
                  Thomas Debris{-}Alazard},
  title        = {A tight security reduction in the quantum random oracle model for
                  code-based signature schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {936},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/936},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaillouxD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaillouxNS17,
  author       = {Andr{\'{e}} Chailloux and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {An Efficient Quantum Collision Search Algorithm and Implications on
                  Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {847},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/847},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaillouxNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortiIMN17,
  author       = {Avik Chakraborti and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Mridul Nandi},
  title        = {Blockcipher-based Authenticated Encryption: How Small Can We Go?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortiIMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyAR17,
  author       = {Suvradip Chakraborty and
                  Janaka Alawatugoda and
                  C. Pandu Rangan},
  title        = {New Approach to Practical Leakage-Resilient Public-Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/441},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyGMS17,
  author       = {Debrup Chakraborty and
                  Sebati Ghosh and
                  Cuauhtemoc Mancillas L{\'{o}}pez and
                  Palash Sarkar},
  title        = {{FAST:} Disk Encryption and Beyond},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/849},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyGMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyGS17,
  author       = {Debrup Chakraborty and
                  Sebati Ghosh and
                  Palash Sarkar},
  title        = {Evaluating Bernstein-Rabin-Winograd Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyMS17,
  author       = {Abhishek Chakraborty and
                  Ankit Mondal and
                  Ankur Srivastava},
  title        = {Correlation Power Analysis Attack against {STT-MRAM} Based Cyptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/413},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyPR17,
  author       = {Suvradip Chakraborty and
                  Goutam Paul and
                  C. Pandu Rangan},
  title        = {Efficient Compilers for After-the-Fact Leakage: from {CPA} to {CCA-2}
                  secure {PKE} to {AKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyRMR17,
  author       = {Suvradip Chakraborty and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay and
                  C. Pandu Rangan},
  title        = {Leakage-Resilient Tweakable Encryption from One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyRMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanCMS17,
  author       = {T.{-}H. Hubert Chan and
                  Kai{-}Min Chung and
                  Bruce M. Maggs and
                  Elaine Shi},
  title        = {Foundations of Differentially Oblivious Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1033},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanCMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanCS17,
  author       = {T.{-}H. Hubert Chan and
                  Kai{-}Min Chung and
                  Elaine Shi},
  title        = {On the Depth of Oblivious Parallel {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {861},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/861},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanGLS17,
  author       = {T.{-}H. Hubert Chan and
                  Yue Guo and
                  Wei{-}Kai Lin and
                  Elaine Shi},
  title        = {Cache-Oblivious and Data-Oblivious Sorting and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {914},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/914},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanGLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanGLS17a,
  author       = {T.{-}H. Hubert Chan and
                  Yue Guo and
                  Wei{-}Kai Lin and
                  Elaine Shi},
  title        = {Oblivious Hashing Revisited, and Applications to Asymptotically Efficient
                  {ORAM} and {OPRAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {924},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/924},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanGLS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranCOV17,
  author       = {Nishanth Chandran and
                  Wutichai Chongchitmate and
                  Rafail Ostrovsky and
                  Ivan Visconti},
  title        = {Universally Composable Secure Two and Multi-party Computation in the
                  Corruptible Tamper-Proof Hardware Token Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1092},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranCOV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGMV17,
  author       = {Nishanth Chandran and
                  Juan A. Garay and
                  Payman Mohassel and
                  Satyanarayana Vusirikala},
  title        = {Efficient, Constant-Round and Actively Secure {MPC:} Beyond the Three-Party
                  Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/519},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranGMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGRST17,
  author       = {Nishanth Chandran and
                  Divya Gupta and
                  Aseem Rastogi and
                  Rahul Sharma and
                  Shardul Tripathi},
  title        = {EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1109},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1109},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranGRST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangJMS17,
  author       = {Donghoon Chang and
                  Arpan Jati and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  title        = {Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangJMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangMSS17,
  author       = {Donghoon Chang and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya and
                  Ajit Pratap Singh},
  title        = {On Making {U2F} Protocol Leakage-Resilient via Re-keying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {721},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/721},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangMSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseDGORRSZ17,
  author       = {Melissa Chase and
                  David Derler and
                  Steven Goldfeder and
                  Claudio Orlandi and
                  Sebastian Ramacher and
                  Christian Rechberger and
                  Daniel Slamanig and
                  Greg Zaverucha},
  title        = {Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseDGORRSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseGLLR17,
  author       = {Melissa Chase and
                  Ran Gilad{-}Bachrach and
                  Kim Laine and
                  Kristin E. Lauter and
                  Peter Rindal},
  title        = {Private Collaborative Neural Network Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {762},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/762},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseGLLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeGKT17,
  author       = {Sanjit Chatterjee and
                  Deepak Garg and
                  Aniket Kate and
                  Tobias Theobald},
  title        = {Encrypting Messages for Incomplete Chains of Certificates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {777},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/777},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeGKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeGSMCM17,
  author       = {Urbi Chatterjee and
                  Vidya Govindan and
                  Rajat Sadhukhan and
                  Debdeep Mukhopadhyay and
                  Rajat Subhra Chakraborty and
                  Debashis Mahata and
                  Mukesh M. Prabhu},
  title        = {{PUF+IBE:} Blending Physically Unclonable Functions with Identity
                  Based Encryption for Authentication and Key Exchange in IoTs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeGSMCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeMP17,
  author       = {Sanjit Chatterjee and
                  Sayantan Mukherjee and
                  Tapas Pandit},
  title        = {CCA-secure Predicate Encryption from Pair Encoding in Prime Order
                  Groups: Generic and Efficient},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {657},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/657},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeWPCR17,
  author       = {Rahul Chatterjee and
                  Joanne Woodage and
                  Yuval Pnueli and
                  Anusha Chowdhury and
                  Thomas Ristenpart},
  title        = {The TypTop System: Personalized Typo-Tolerant Password Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {810},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/810},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeWPCR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chauvet17,
  author       = {Jean{-}Marie Chauvet},
  title        = {Gimli, Lord of the Glittering {TRS-80}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {792},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/792},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chauvet17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHRSS17,
  author       = {Ming{-}Shing Chen and
                  Andreas H{\"{u}}lsing and
                  Joost Rijneveld and
                  Simona Samardjiska and
                  Peter Schwabe},
  title        = {{SOFIA:} MQ-based signatures in the {QROM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/680},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHRSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLMP17,
  author       = {Yu Long Chen and
                  Atul Luykx and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Efficient Length Doubling From Tweakable Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/841},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLP17,
  author       = {Hao Chen and
                  Kim Laine and
                  Rachel Player},
  title        = {Simple Encrypted Arithmetic Library - {SEAL} v2.1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLPX17,
  author       = {Hao Chen and
                  Kim Laine and
                  Rachel Player and
                  Yuhou Xia},
  title        = {High-Precision Arithmetic in Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {809},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/809},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLPX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLPYC17,
  author       = {Ming{-}Shing Chen and
                  Wen{-}Ding Li and
                  Bo{-}Yuan Peng and
                  Bo{-}Yin Yang and
                  Chen{-}Mou Cheng},
  title        = {Implementing 128-bit Secure {MPKC} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/636},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLPYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLR17,
  author       = {Hao Chen and
                  Kim Laine and
                  Peter Rindal},
  title        = {Fast Private Set Intersection from Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSG17,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo},
  title        = {Strong Authenticated Key Exchange with Auxiliary Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMYSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenSNVGC17,
  author       = {Zhi Chen and
                  Junjie Shen and
                  Alex Nicolau and
                  Alexander V. Veidenbaum and
                  Nahid Farhady Ghalaty and
                  Rosario Cammarota},
  title        = {{CAMFAS:} {A} Compiler Approach to Mitigate Fault Attacks via Enhanced
                  SIMDization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1083},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1083},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenSNVGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZW17,
  author       = {Long Chen and
                  Zhenfeng Zhang and
                  Xueqing Wang},
  title        = {Batched Multi-hop Multi-key {FHE} from ring-LWE with Compact Ciphertext
                  Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {923},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/923},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cheng17,
  author       = {Zhaohui Cheng},
  title        = {The {SM9} Cryptographic Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cheng17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengI017,
  author       = {Kuan Cheng and
                  Yuval Ishai and
                  Xin Li},
  title        = {Near-Optimal Secret Sharing and Error Correcting Codes in {AC0}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {927},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/927},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengI017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengZCZ0GS17,
  author       = {Wei Cheng and
                  Chao Zheng and
                  Yuchen Cao and
                  Yongbin Zhou and
                  Hailong Zhang and
                  Sylvain Guilley and
                  Laurent Sauvage},
  title        = {How Far Can We Reach? Breaking RSM-Masked {AES-128} Implementation
                  Using Only One Trace},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1144},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1144},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengZCZ0GS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonHK17,
  author       = {Jung Hee Cheon and
                  Kyoohyung Han and
                  Duhyeong Kim},
  title        = {Faster Bootstrapping of {FHE} over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonHL17,
  author       = {Jung Hee Cheon and
                  Minki Hhan and
                  Changmin Lee},
  title        = {Cryptanalysis of the Overstretched {NTRU} Problem for General Modulus
                  Polynomial},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/484},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonKS17,
  author       = {Jung Hee Cheon and
                  Miran Kim and
                  Yong Soo Song},
  title        = {Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChepurnoyDFZ17,
  author       = {Alexander Chepurnoy and
                  Tuyet Duong and
                  Lei Fan and
                  Hong{-}Sheng Zhou},
  title        = {TwinsCoin: {A} Cryptocurrency via Proof-of-Work and Proof-of-Stake},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/232},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChepurnoyDFZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChiesaFS17,
  author       = {Alessandro Chiesa and
                  Michael A. Forbes and
                  Nicholas Spooner},
  title        = {A Zero Knowledge Sumcheck and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/305},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChiesaFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiGGI17,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  title        = {Improving {TFHE:} faster packed homomorphic operations and efficient
                  circuit bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiGGI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoDG0MP17,
  author       = {Chongwon Cho and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Antigoni Polychroniadou},
  title        = {Laconic Oblivious Transfer and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/491},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoDG0MP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChongchitmateO17,
  author       = {Wutichai Chongchitmate and
                  Rafail Ostrovsky},
  title        = {Circuit-Private Multi-Key {FHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChongchitmateO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChongchitmateOV17,
  author       = {Wutichai Chongchitmate and
                  Rafail Ostrovsky and
                  Ivan Visconti},
  title        = {Resettably-Sound Resettable Zero Knowledge in Constant Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {925},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/925},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChongchitmateOV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chopra17,
  author       = {Arjun Chopra},
  title        = {{GLYPH:} {A} New Insantiation of the {GLP} Digital Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {766},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/766},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chopra17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardSGPP17,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Decentralized Multi-Client Functional Encryption for Inner Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardSGPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chou17,
  author       = {Tung Chou},
  title        = {McBits Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {793},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/793},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chou17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudaryP17,
  author       = {Marios O. Choudary and
                  Pantelimon George Popescu},
  title        = {Back to Massey: Impressively fast, scalable and tight security evaluation
                  tools},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudaryP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Choudhuri00KM17,
  author       = {Arka Rai Choudhuri and
                  Matthew Green and
                  Abhishek Jain and
                  Gabriel Kaptchuk and
                  Ian Miers},
  title        = {Fairness in an Unfair World: Fair Multiparty Computation from public
                  Bulletin Boards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1091},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1091},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Choudhuri00KM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryPR17,
  author       = {Ashish Choudhury and
                  Arpita Patra and
                  Divya Ravi},
  title        = {Round and Communication Efficient Unconditionally-secure {MPC} with
                  t {\textless} n/3 in Partially Synchronous Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1006},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Christensen17,
  author       = {Ren{\'{e}} B{\o}dker Christensen},
  title        = {On one-round reliable message transmission},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1042},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Christensen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiOSV17,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  title        = {Round-Optimal Secure Two-Party Computation from Trapdoor Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {920},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/920},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiOSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiOSV17a,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  title        = {Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing
                  in Four Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {931},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/931},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiOSV17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CidHPSS17,
  author       = {Carlos Cid and
                  Tao Huang and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Ling Song},
  title        = {Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {693},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/693},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CidHPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CilardoP17,
  author       = {Alessandro Cilardo and
                  Andrea Primativo},
  title        = {Verification of FPGA-augmented trusted computing mechanisms based
                  on Applied Pi Calculus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1246},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CilardoP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM17,
  author       = {Michael Clear and
                  Ciaran McGoldrick},
  title        = {Attribute-Based Group Homomorphic Encryption and Additively Homomorphic
                  {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {752},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/752},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClearM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoelhoLC17,
  author       = {Fabien Coelho and
                  Arnaud Larroche and
                  Baptiste Colin},
  title        = {Itsuku: a Memory-Hardened Proof-of-Work Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1168},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoelhoLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cohen17,
  author       = {Aloni Cohen},
  title        = {What about Bob? The Inadequacy of {CPA} Security for Proxy Reencryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {785},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/785},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cohen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenCGZ17,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  title        = {Round-Preserving Parallel Composition of Probabilistic-Termination
                  Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenCGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cohn-GordonC17,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers},
  title        = {Mind the Gap: Where Provable Security and Real-World Messaging Don't
                  Quite Meet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {982},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/982},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cohn-GordonC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cohn-GordonCGMM17,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Luke Garratt and
                  Jon Millican and
                  Kevin Milner},
  title        = {On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong
                  Security Guarantees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {666},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/666},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cohn-GordonCGMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CojocarPT17,
  author       = {Lucian Cojocar and
                  Kostas Papagiannopoulos and
                  Niek Timmers},
  title        = {Instruction Duplication: Leaky and Not Too Fault-Tolerant!},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1082},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CojocarPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDGS17,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Siyao Guo and
                  John P. Steinberger},
  title        = {Random Oracles and Non-Uniformity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {937},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/937},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Coron17,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  title        = {High-Order Conversion From Boolean to Arithmetic Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Coron17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Coron17a,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  title        = {Formal Verification of Side-channel Countermeasures via Elementary
                  Circuit Transformations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {879},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/879},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Coron17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronRZ17,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Franck Rondepierre and
                  Rina Zeitoun},
  title        = {High Order Masking of Look-up Tables with Common Shares},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronRZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorreGD17,
  author       = {Yann Le Corre and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Daniel Dinu},
  title        = {Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic
                  Software on {ARM} Cortex-M3 Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1253},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorreGD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Corrigan-GibbsK17,
  author       = {Henry Corrigan{-}Gibbs and
                  Dmitry Kogan},
  title        = {The Discrete-Logarithm Problem with Preprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1113},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Corrigan-GibbsK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostaMM17,
  author       = {N{\'{u}}ria Costa and
                  Ramiro Mart{\'{\i}}nez and
                  Paz Morillo},
  title        = {Proof of a shuffle for lattice-based cryptography (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {900},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/900},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostaMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostacheS17,
  author       = {Anamaria Costache and
                  Nigel P. Smart},
  title        = {Homomorphic Encryption without Gaussian Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostacheS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloH17,
  author       = {Craig Costello and
                  H{\"{u}}seyin Hisil},
  title        = {A simple and compact algorithm for {SIDH} with arbitrary degree isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloS17,
  author       = {Craig Costello and
                  Benjamin Smith},
  title        = {Montgomery curves and their arithmetic: The case of large characteristic
                  fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourousseBRJPL17,
  author       = {Damien Courouss{\'{e}} and
                  Thierno Barry and
                  Bruno Robisson and
                  Philippe Jaillon and
                  Olivier Potin and
                  Jean{-}Louis Lanet},
  title        = {Runtime Code Polymorphism as a Protection Against Side Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {699},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/699},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourousseBRJPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisSDPOSB17,
  author       = {Nicolas T. Courtois and
                  Klaus Schmeh and
                  J{\"{o}}rg Drobick and
                  Jacques Patarin and
                  Maria{-}Bristena Oprisanu and
                  Matteo Scarlata and
                  Om Bhallamudi},
  title        = {Cryptographic Security Analysis of {T-310}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisSDPOSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CousinsCGKPRRS17,
  author       = {David Bruce Cousins and
                  Giovanni Di Crescenzo and
                  Kamil Doruk G{\"{u}}r and
                  Kevin King and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Gerard W. Ryan and
                  Erkay Savas},
  title        = {Implementing Conjunction Obfuscation under Entropic Ring {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {844},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/844},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CousinsCGKPRRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrepeauY17,
  author       = {Claude Cr{\'{e}}peau and
                  Nan Yang},
  title        = {Multi-Prover Interactive Proofs: Unsound Foundations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/229},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrepeauY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CzajkowskiBHSU17,
  author       = {Jan Czajkowski and
                  Leon Groot Bruinderink and
                  Andreas H{\"{u}}lsing and
                  Christian Schaffner and
                  Dominique Unruh},
  title        = {Post-quantum security of the sponge construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {771},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/771},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CzajkowskiBHSU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGK17,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1127},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledKS17,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable
                  and Updatable Non-Malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledKS17a,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {Locally Decodable and Updatable Non-Malleable Codes in the Bounded
                  Retrieval Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledKS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenMA17,
  author       = {Joan Daemen and
                  Bart Mennink and
                  Gilles Van Assche},
  title        = {Full-State Keyed Duplex With Built-In Multi-User Support},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DahlPP17,
  author       = {Morten Dahl and
                  Valerio Pastro and
                  Mathieu Poumeyrol},
  title        = {Private Data Aggregation on a Budget},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {643},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/643},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DahlPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiDPRSSS17,
  author       = {Wei Dai and
                  Yarkin Dor{\"{o}}z and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Hadi Sajjadpour and
                  Erkay Savas and
                  Berk Sunar},
  title        = {Implementation and Evaluation of a Lattice-Based Key-Policy {ABE}
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/601},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiDPRSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiHT17,
  author       = {Wei Dai and
                  Viet Tung Hoang and
                  Stefano Tessaro},
  title        = {Information-theoretic Indistinguishability via the Chi-squared Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiSST17,
  author       = {Yuanxi Dai and
                  Yannick Seurin and
                  John P. Steinberger and
                  Aishwarya Thiruvengadam},
  title        = {Five Rounds are Sufficient and Necessary for the Indifferentiability
                  of Iterated Even-Mansour},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiSST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DalskovO17,
  author       = {Anders P. K. Dalskov and
                  Claudio Orlandi},
  title        = {Assessing the No-Knowledge Property of SpiderOak {ONE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DalskovO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardLOSS17,
  author       = {Ivan Damg{\aa}rd and
                  Ji Luo and
                  Sabine Oechsner and
                  Peter Scholl and
                  Mark Simkin},
  title        = {Compact Zero-Knowledge Proofs of Small Hamming Weight},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1041},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardLOSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardOS17,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Mark Simkin},
  title        = {Yet Another Compiler for Active Security or: Efficient {MPC} Over
                  Arbitrary Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {908},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/908},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaniKMSZ17,
  author       = {Varsha Dani and
                  Valerie King and
                  Mahnush Movahedi and
                  Jared Saia and
                  Mahdi Zamani},
  title        = {Secure Multi-Party Computation in Large Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1003},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaniKMSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Das0MK17,
  author       = {Debajyoti Das and
                  Sebastian Meiser and
                  Esfandiar Mohammadi and
                  Aniket Kate},
  title        = {Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low
                  Latency - Choose Two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {954},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/954},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Das0MK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasSA17,
  author       = {Bibhas Chandra Das and
                  Md Kutubuddin Sardar and
                  Avishek Adhikari},
  title        = {Efficient Constructions for t- (k, n)\({}^{\mbox{*}}\)-Random Grid
                  Visual Cryptographic Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {779},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/779},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DataP17,
  author       = {Deepesh Data and
                  Manoj Prabhakaran},
  title        = {Towards Characterizing Securely Computable Two-Party Randomized Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/692},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DataP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDM17,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Attribute-Based Signatures for Turing Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {801},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/801},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDN0Z17,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Goutam Paul and
                  Liting Zhang},
  title        = {Single Key Variant of PMAC{\_}Plus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {848},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/848},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDN0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaLMN17,
  author       = {Nilanjan Datta and
                  Atul Luykx and
                  Bart Mennink and
                  Mridul Nandi},
  title        = {Understanding {RUP} Integrity of {COLM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaLMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidDL17,
  author       = {Bernardo David and
                  Rafael Dowsley and
                  Mario Larangeira},
  title        = {Kaleidoscope: An Efficient Poker Protocol with Payment Distribution
                  and Penalty Enforcement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {899},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/899},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidGKR17,
  author       = {Bernardo Machado David and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake
                  protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/573},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidGKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaM17,
  author       = {Vanesa Daza and
                  Nikolaos Makriyannis},
  title        = {Designing Fully Secure Protocols for Secure Two-Party Computation
                  of Constant-Domain Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Debris-AlazardS17,
  author       = {Thomas Debris{-}Alazard and
                  Nicolas Sendrier and
                  Jean{-}Pierre Tillich},
  title        = {A new signature scheme based on (U{\(\vert\)}U+V) codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/662},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Debris-AlazardS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Delgado-SeguraP17,
  author       = {Sergi Delgado{-}Segura and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Guillermo Navarro{-}Arribas and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {A Fair Protocol for Data Trading Based on Bitcoin Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1018},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Delgado-SeguraP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Delgado-SeguraP17a,
  author       = {Sergi Delgado{-}Segura and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Guillermo Navarro{-}Arribas and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Analysis of the Bitcoin {UTXO} set},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1095},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Delgado-SeguraP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Delvaux17,
  author       = {Jeroen Delvaux},
  title        = {Machine Learning Attacks on PolyPUF, OB-PUF, RPUF, and {PUF-FSM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1134},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Delvaux17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemertzisPP17,
  author       = {Ioannis Demertzis and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou},
  title        = {Searchable Encryption with Optimal Locality: Achieving Sublogarithmic
                  Read Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {749},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/749},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DemertzisPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengGXGDS17,
  author       = {Shuwen Deng and
                  Doguhan G{\"{u}}m{\"{u}}soglu and
                  Wenjie Xiong and
                  Y. Serhan Gener and
                  Onur Demir and
                  Jakub Szefer},
  title        = {SecChisel: Language and Tool for Practical and Scalable Security Verification
                  of Security-Aware Hardware Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengGXGDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengSYC17,
  author       = {Yi Deng and
                  Xuyang Song and
                  Jingyue Yu and
                  Yu Chen},
  title        = {On Instance Compression, Schnorr/Guillou-Quisquater, and the Security
                  of Classic Protocols for Unique Witness Relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengSYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DequenIT17,
  author       = {Gilles Dequen and
                  Sorina Ionica and
                  Monika Trimoska},
  title        = {Parallel Collision Search with Radix Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DequenIT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerRS17,
  author       = {David Derler and
                  Sebastian Ramacher and
                  Daniel Slamanig},
  title        = {Homomorphic Proxy Re-Authenticators and Applications to Verifiable
                  Multi-User Data Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerRS17a,
  author       = {David Derler and
                  Sebastian Ramacher and
                  Daniel Slamanig},
  title        = {Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications
                  to Ring Signatures from Symmetric-Key Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1154},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerRS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerRS17b,
  author       = {David Derler and
                  Sebastian Ramacher and
                  Daniel Slamanig},
  title        = {Short Double- and N-Times-Authentication-Preventing Signatures from
                  {ECDSA} and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1203},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerRS17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Devadas0X17,
  author       = {Srinivas Devadas and
                  Ling Ren and
                  Hanshen Xiao},
  title        = {On Iterative Collision Search for {LPN} and Subset Sum},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {904},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/904},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Devadas0X17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dey017,
  author       = {Sabyasachi Dey and
                  Santanu Sarkar},
  title        = {Settling the mystery of Z\({}_{\mbox{r=r}}\) in {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1072},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dey017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeyG17,
  author       = {Sankhanil Dey and
                  Ranjan Ghosh},
  title        = {Multiplication and Division over Extended Galois Field GF(p\({}^{\mbox{q}}\)):
                  {A} new Approach to find Monic Irreducible Polynomials over any Galois
                  Field GF(p\({}^{\mbox{q}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeyG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeyG17a,
  author       = {Sankhanil Dey and
                  Ranjan Ghosh},
  title        = {A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and
                  Two New Techniques with 4-bit Boolean Functions for Cryptanalysis
                  of 4-bit Crypto S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1161},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeyG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeyS17,
  author       = {Sabyasachi Dey and
                  Santanu Sarkar},
  title        = {Cryptanalysis of full round Fruit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeyS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DharYKC17,
  author       = {Aritra Dhar and
                  Der{-}Yeuan Yu and
                  Kari Kostiainen and
                  Srdjan Capkun},
  title        = {IntegriKey: End-to-End Integrity Protection of User Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1245},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DharYKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Diehl17,
  author       = {William Diehl},
  title        = {Attack on {AES} Implementation Exploiting Publicly-visible Partial
                  Result},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {788},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/788},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Diehl17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkJMNR17,
  author       = {Marten van Dijk and
                  Chenglu Jin and
                  Hoda Maleki and
                  Phuong Ha Nguyen and
                  Reza Rahaeimehr},
  title        = {Weak-Unforgeable Tags for Secure Supply Chain Management},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1221},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkJMNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dimitriou17,
  author       = {Tassos Dimitriou},
  title        = {Privacy-respecting Reward Generation and Accumulation for Participatory
                  Sensing Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1035},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dimitriou17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingFR17,
  author       = {Jintai Ding and
                  Scott R. Fluhrer and
                  Saraswathy RV},
  title        = {Complete Attack on {RLWE} Key Exchange with reused keys, without Signal
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1185},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingFR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingPPS17,
  author       = {Jintai Ding and
                  Ray A. Perlner and
                  Albrecht Petzoldt and
                  Daniel Smith{-}Tone},
  title        = {Improved Cryptanalysis of HFEv- via Projection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1149},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurN17,
  author       = {Itai Dinur and
                  Niv Nadler},
  title        = {Time-Memory Tradeoff Attacks on the {MTP} Proof-of-Work Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisF17,
  author       = {Yevgeniy Dodis and
                  Dario Fiore},
  title        = {Unilaterally-Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/109},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKSTZ17,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  John P. Steinberger and
                  Aishwarya Thiruvengadam and
                  Zhe Zhang},
  title        = {Provable Security of Substitution-Permutation Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKSTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoernerS17,
  author       = {Jack Doerner and
                  Abhi Shelat},
  title        = {Scaling {ORAM} for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {827},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/827},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoernerS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoliskaniPB17,
  author       = {Javad Doliskani and
                  Geovandro C. C. F. Pereira and
                  Paulo S. L. M. Barreto},
  title        = {Faster Cryptographic Hash Function From Supersingular Isogeny Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1202},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoliskaniPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongHLK17,
  author       = {Qiuxiang Dong and
                  Dijiang Huang and
                  Jim Luo and
                  Myong H. Kang},
  title        = {{HIR-CP-ABE:} Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based
                  Encryption for Secure and Flexible Data Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1101},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongHLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongHLK17a,
  author       = {Qiuxiang Dong and
                  Dijiang Huang and
                  Jim Luo and
                  Myong H. Kang},
  title        = {{ID-HABE:} Incorporating ID-based Revocation, Delegation, and Authority
                  Hierarchy into Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1102},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongHLK17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongLW17,
  author       = {Xiaoyang Dong and
                  Zheng Li and
                  Xiaoyun Wang},
  title        = {Quantum Cryptanalysis on Some Generalized Feistel Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1249},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1249},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongLWQ17,
  author       = {Xiaoyang Dong and
                  Zheng Li and
                  Xiaoyun Wang and
                  Ling Qin},
  title        = {Cube-like Attack on Round-Reduced Initialization of Ketje Sr},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/159},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongLWQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongM17,
  author       = {Le Dong and
                  Yongxia Mao},
  title        = {Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1071},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongW17,
  author       = {Xiaoyang Dong and
                  Xiaoyun Wang},
  title        = {Quantum Key-recovery Attack on Feistel Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1199},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1199},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DorozHPSSWZ17,
  author       = {Yarkin Dor{\"{o}}z and
                  Jeffrey Hoffstein and
                  Jill Pipher and
                  Joseph H. Silverman and
                  Berk Sunar and
                  William Whyte and
                  Zhenfei Zhang},
  title        = {Fully Homomorphic Encryption from the Finite Field Isomorphism Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/548},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DorozHPSSWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingFKS17,
  author       = {Nico D{\"{o}}ttling and
                  Nils Fleischhacker and
                  Johannes Krupp and
                  Dominique Schr{\"{o}}der},
  title        = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {958},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/958},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingFKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingG17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg},
  title        = {Identity-Based Encryption from the Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/543},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingG17a,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg},
  title        = {From Selective {IBE} to Full {IBE} and Selective {HIBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {957},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/957},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGHM17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny},
  title        = {New Constructions of Identity-Based and Key-Dependent Message Secure
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {978},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/978},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGNNT17,
  author       = {Nico D{\"{o}}ttling and
                  Satrajit Ghosh and
                  Jesper Buus Nielsen and
                  Tobias Nilges and
                  Roberto Trifiletti},
  title        = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious
                  Linear Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {790},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/790},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGNNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingNO17,
  author       = {Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen and
                  Maciej Obremski},
  title        = {Information Theoretic Continuously Non-Malleable Codes in the Constant
                  Split-State Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingNO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DruckerG17,
  author       = {Nir Drucker and
                  Shay Gueron},
  title        = {A toolbox for software optimization of {QC-MDPC} code-based cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1251},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DruckerG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuW17,
  author       = {Yusong Du and
                  Baodian Wei},
  title        = {On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution
                  over Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {988},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/988},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Duarte17,
  author       = {Eduardo Ruiz Duarte},
  title        = {Reduced Mumford divisors of a genus 2 curve through its jacobian function
                  field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Duarte17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dubois17,
  author       = {Renaud Dubois},
  title        = {Trapping {ECC} with Invalid Curve Bug Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dubois17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ducas17,
  author       = {L{\'{e}}o Ducas},
  title        = {Shortest Vector from Lattice Sieving: a Few Dimensions for Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {999},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/999},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ducas17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasLLSSS17,
  author       = {L{\'{e}}o Ducas and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky and
                  Peter Schwabe and
                  Gregor Seiler and
                  Damien Stehl{\'{e}}},
  title        = {{CRYSTALS} - Dilithium: Digital Signatures from Module Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasLLSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasP17,
  author       = {L{\'{e}}o Ducas and
                  Alice Pellet{-}Mary},
  title        = {On the Statistical Leak of the {GGH13} Multilinear Map and some Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DumitrescuSS17,
  author       = {Dragos Dumitrescu and
                  Ioan{-}Mihail Stan and
                  Emil Simion},
  title        = {Steganography techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DumitrescuSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongYT17,
  author       = {Dung Hoang Duong and
                  Masaya Yasuda and
                  Tsuyoshi Takagi},
  title        = {Choosing Parameters for the Subfield Lattice Attack against overstretched
                  {NTRU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/959},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongYT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupontHPRY17,
  author       = {Pierre{-}Alain Dupont and
                  Julia Hesse and
                  David Pointcheval and
                  Leonid Reyzin and
                  Sophia Yakoubov},
  title        = {Fuzzy Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1111},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupontHPRY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurakV17,
  author       = {F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  title        = {Breaking the {FF3} Format-Preserving Encryption Standard Over Small
                  Domains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurakV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuttaJN17,
  author       = {Avijit Dutta and
                  Ashwin Jha and
                  Mridul Nandi},
  title        = {Tight Security Analysis of EHtM {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {837},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/837},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuttaJN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiEFM17,
  author       = {Stefan Dziembowski and
                  Lisa Eckey and
                  Sebastian Faust and
                  Daniel Malinowski},
  title        = {{PERUN:} Virtual Payment Channels over Cryptographic Currencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/635},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiEFM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Eaton17,
  author       = {Edward Eaton},
  title        = {Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/607},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Eaton17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EcclesH17,
  author       = {Tom Eccles and
                  Basel Halak},
  title        = {A Secure and Private Billing Protocol for Smart Metering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/654},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EcclesH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EckeyFL17,
  author       = {Lisa Eckey and
                  Sebastian Faust and
                  Julian Loss},
  title        = {Efficient Algorithms for Broadcast and Consensus Based on Proofs of
                  Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {915},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/915},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EckeyFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EichlsederK17,
  author       = {Maria Eichlseder and
                  Daniel Kales},
  title        = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1136},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EichlsederK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EisentragerHM17,
  author       = {Kirsten Eisentr{\"{a}}ger and
                  Sean Hallgren and
                  Travis Morrison},
  title        = {On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic
                  Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/986},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EisentragerHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ekera17,
  author       = {Martin Eker{\aa}},
  title        = {On post-processing in the quantum algorithm for computing short discrete
                  logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1122},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ekera17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EkeraH17,
  author       = {Martin Eker{\aa} and
                  Johan H{\aa}stad},
  title        = {Quantum algorithms for computing short discrete logarithms and factoring
                  {RSA} integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EkeraH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Emura17,
  author       = {Keita Emura},
  title        = {Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability
                  from Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Emura17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EnderG0P17,
  author       = {Maik Ender and
                  Samaneh Ghandali and
                  Amir Moradi and
                  Christof Paar},
  title        = {The First Thorough Side-Channel Hardware Trojan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {865},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/865},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EnderG0P17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EnderWM17,
  author       = {Maik Ender and
                  Alexander Wild and
                  Amir Moradi},
  title        = {SafeDRP: Yet Another Way Toward Power-Equalized Designs in {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EnderWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EndignouxV17,
  author       = {Guillaume Endignoux and
                  Damian Viz{\'{a}}r},
  title        = {Linking Online Misuse-Resistant Authenticated Encryption and Blockwise
                  Attack Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EndignouxV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsfahaniGS17,
  author       = {Navid Nasr Esfahani and
                  Ian Goldberg and
                  Douglas R. Stinson},
  title        = {Some results on the existence of t-all-or-nothing transforms over
                  arbitrary alphabets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EsfahaniGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EspelKR17,
  author       = {Thomas Espel and
                  Laurent Katz and
                  Guillaume Robin},
  title        = {Proposal for Protocol on a Quorum Blockchain with Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1093},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EspelKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EspitauFGT17,
  author       = {Thomas Espitau and
                  Pierre{-}Alain Fouque and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Mehdi Tibouchi},
  title        = {Side-Channel Attacks on {BLISS} Lattice-Based Signatures - Exploiting
                  Branch Tracing Against strongSwan and Electromagnetic Emanations in
                  Microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/505},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EspitauFGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsserKM17,
  author       = {Andre Esser and
                  Robert K{\"{u}}bler and
                  Alexander May},
  title        = {{LPN} Decoded},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/078},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EsserKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EverspaughPRS17,
  author       = {Adam Everspaugh and
                  Kenneth G. Paterson and
                  Thomas Ristenpart and
                  Samuel Scott},
  title        = {Key Rotation for Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EverspaughPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FabsicHSZG017,
  author       = {Tom{\'{a}}s Fabsic and
                  Viliam Hromada and
                  Paul Stankovski and
                  Pavol Zajac and
                  Qian Guo and
                  Thomas Johansson},
  title        = {A Reaction Attack on the {QC-LDPC} McEliece Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FabsicHSZG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanGK17,
  author       = {Xiong Fan and
                  Chaya Ganesh and
                  Vladimir Kolesnikov},
  title        = {Hashing Garbled Circuits for Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanL17,
  author       = {Xiong Fan and
                  Feng{-}Hao Liu},
  title        = {Proxy Re-Encryption and Re-Signatures from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanTL17,
  author       = {Chun{-}I Fan and
                  Yi{-}Fan Tseng and
                  Chih{-}Wen Lin},
  title        = {Attribute-Based Encryption from Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanZ17,
  author       = {Lei Fan and
                  Hong{-}Sheng Zhou},
  title        = {iChing: {A} Scalable Proof-of-Stake Blockchain in the Open Setting
                  (or, How to Mimic Nakamoto's Design via Proof-of-Stake)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {656},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/656},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FanZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarrasKMP17,
  author       = {Oriol Farr{\`{a}}s and
                  Tarik Kaced and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Carles Padr{\'{o}}},
  title        = {Improving the Linear Programming Technique in the Search for Lower
                  Bounds in Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {919},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/919},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarrasKMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarshimKV17,
  author       = {Pooya Farshim and
                  Louiza Khati and
                  Damien Vergnaud},
  title        = {Security of Even-Mansour Ciphers under Key-Dependent Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/475},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarshimKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarshimOR17,
  author       = {Pooya Farshim and
                  Claudio Orlandi and
                  Razvan Rosie},
  title        = {Security of Symmetric Primitives under Incorrect Usage of Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarshimOR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaugereHKKKP17,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Kelsey Horan and
                  Delaram Kahrobaei and
                  Marc Kaplan and
                  Elham Kashefi and
                  Ludovic Perret},
  title        = {Fast Quantum Algorithm for Solving Multivariate Quadratic Equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1236},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaugereHKKKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauskangerS17,
  author       = {Stian Fauskanger and
                  Igor A. Semaev},
  title        = {Separable Statistics and Multidimensional Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {994},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/994},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauskangerS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustGPPS17,
  author       = {Sebastian Faust and
                  Vincent Grosso and
                  Santos Merino Del Pozo and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Composable Masking Schemes in the Presence of Physical Defaults and
                  the Robust Probing Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustGPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHM017,
  author       = {Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {Non-Malleable Codes for Space-Bounded Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/530},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustPS17,
  author       = {Sebastian Faust and
                  Clara Paglialonga and
                  Tobias Schneider},
  title        = {Amortizing Randomness Complexity in Private Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziLS017,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  title        = {An Efficient Pairing-Based Shuffle Argument},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {894},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/894},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziLS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Faz-HernandezLO17,
  author       = {Armando Faz{-}Hern{\'{a}}ndez and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Eduardo Ochoa{-}Jim{\'{e}}nez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman
                  Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1015},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1015},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Faz-HernandezLO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FehrS17,
  author       = {Serge Fehr and
                  Louis Salvail},
  title        = {Quantum Authentication and Encryption with Key Recycling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FehrS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengQZLCF17,
  author       = {Wei Feng and
                  Yu Qin and
                  Shijun Zhao and
                  Ziwen Liu and
                  XiaoBo Chu and
                  Dengguo Feng},
  title        = {Secure Code Updates for Smart Embedded Devices based on PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {991},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/991},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FengQZLCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiN17,
  author       = {Houda Ferradi and
                  David Naccache},
  title        = {Integer Reconstruction Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1231},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerreiraLD17,
  author       = {Bernardo Ferreira and
                  Jo{\~{a}}o Leit{\~{a}}o and
                  Henrique Jo{\~{a}}o L. Domingos},
  title        = {Multimodal Indexable Encryption for Mobile Cloud-based Applications
                  (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/315},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FerreiraLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerreiraLD17a,
  author       = {Bernardo Ferreira and
                  Jo{\~{a}}o Leit{\~{a}}o and
                  Henrique Jo{\~{a}}o L. Domingos},
  title        = {MuSE: Multimodal Searchable Encryption for Cloud Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/661},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FerreiraLD17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerschKP17,
  author       = {Manuel Fersch and
                  Eike Kiltz and
                  Bertram Poettering},
  title        = {On the One-Per-Message Unforgeability of {(EC)DSA} and its Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {890},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/890},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerschKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreVS17,
  author       = {Dario Fiore and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Claudio Soriente},
  title        = {Partitioned Group Password-Based Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/141},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinG17,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther},
  title        = {Replay Attacks on Zero Round-Trip Time: The Case of the {TLS} 1.3
                  Handshake Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinGMP17,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Kenneth G. Paterson},
  title        = {Data Is a Stream: Security of Stream-Based Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1191},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinGMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinM17,
  author       = {Marc Fischlin and
                  Sogol Mazaheri},
  title        = {Self-Guarding Cryptographic Protocols against Algorithm Substitution
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {984},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/984},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer17,
  author       = {Scott R. Fluhrer},
  title        = {Further Analysis of a Proposed Hash-Based Signature Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/553},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fluhrer17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer17a,
  author       = {Scott R. Fluhrer},
  title        = {Reassessing Grover's Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {811},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/811},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fluhrer17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FontaineV17,
  author       = {David Fontaine and
                  Olivier Vivolo},
  title        = {Proposal of primitive polynomials for Linux kernel {PRNG}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {726},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/726},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FontaineV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ForlerLLW17,
  author       = {Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  title        = {Reforgeability of Authenticated Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ForlerLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenPY17,
  author       = {Tore Kasper Frederiksen and
                  Benny Pinkas and
                  Avishay Yanai},
  title        = {Committed {MPC} - Maliciously Secure Multiparty Computation from Homomorphic
                  Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrederiksenPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuF17,
  author       = {Shihui Fu and
                  Xiutao Feng},
  title        = {Involutory Differentially 4-Uniform Permutations from Known Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuFW17,
  author       = {Shihui Fu and
                  Xiutao Feng and
                  Baofeng Wu},
  title        = {Differentially 4-Uniform Permutations with the Best Known Nonlinearity
                  from Butterflies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuFW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuWC17,
  author       = {Ximing Fu and
                  Xiaoyun Wang and
                  Jiazhe Chen},
  title        = {Determining the Nonexistent Terms of Non-linear Multivariate Polynomials:
                  How to Break Grain-128 More Efficiently},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuWWXW17,
  author       = {Shan Fu and
                  Zongyue Wang and
                  Fanxing Wei and
                  Guoai Xu and
                  An Wang},
  title        = {Linear Regression Side Channel Attack Applied on Constant {XOR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1217},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuWWXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fuchsbauer17,
  author       = {Georg Fuchsbauer},
  title        = {Subversion-zero-knowledge SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {587},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/587},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fuchsbauer17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerGKO17,
  author       = {Georg Fuchsbauer and
                  Romain Gay and
                  Lucas Kowalczyk and
                  Claudio Orlandi},
  title        = {Access Control Encryption for Equality, Comparison, and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerGKO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujitaK17,
  author       = {Maiki Fujita and
                  Takeshi Koshiba},
  title        = {Perfectly Secure Message Transmission Scheme against Rational Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujitaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FyrbiakWSHHWWTP17,
  author       = {Marc Fyrbiak and
                  Sebastian Wallat and
                  Pawel Swierczynski and
                  Max Hoffmann and
                  Sebastian Hoppach and
                  Matthias Wilhelm and
                  Tobias Weidlich and
                  Russell Tessier and
                  Christof Paar},
  title        = {{HAL-} The Missing Piece of the Puzzle for Hardware Reverse Engineering,
                  Trojan Detection and Insertion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {783},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/783},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FyrbiakWSHHWWTP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaboritHPT17,
  author       = {Philippe Gaborit and
                  Adrien Hauteville and
                  Duong Hieu Phan and
                  Jean{-}Pierre Tillich},
  title        = {Identity-based Encryption from Codes with Rank Metric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaboritHPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GadiyarP17,
  author       = {H. Gopalakrishna Gadiyar and
                  R. Padma},
  title        = {The discrete logarithm problem over prime fields: the safe prime case.
                  The Smart attack, non-canonical lifts and logarithmic derivatives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GadiyarP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GagliardoniKK17,
  author       = {Tommaso Gagliardoni and
                  Nikolaos P. Karvelas and
                  Stefan Katzenbeisser},
  title        = {ORAMs in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GagliardoniKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithV17,
  author       = {Steven D. Galbraith and
                  Frederik Vercauteren},
  title        = {Computational problems in supersingular elliptic curve isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {774},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/774},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GallinCT17,
  author       = {Gabriel Gallin and
                  T{\"{u}}rk{\"{u}} {\"{O}}zl{\"{u}}m {\c{C}}elik and
                  Arnaud Tisserand},
  title        = {Architecture level Optimizations for Kummer based {HECC} on FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1009},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1009},
  timestamp    = {Sat, 03 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GallinCT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaltelandG17,
  author       = {Herman Galteland and
                  Kristian Gj{\o}steen},
  title        = {Malware encryption schemes - rerandomizable ciphertexts encrypted
                  using environmental keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1007},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaltelandG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GancherGL17,
  author       = {Joshua Gancher and
                  Adam Groce and
                  Alex Ledger},
  title        = {Externally Verifiable Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GancherGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaneshP17,
  author       = {Chaya Ganesh and
                  Arpita Patra},
  title        = {Optimal Extension Protocols for Byzantine Broadcast and Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaneshP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GanjiTS17,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Jean{-}Pierre Seifert},
  title        = {Noise-Tolerant Machine Learning Attacks against Physically Unclonable
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {551},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/551},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GanjiTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoDLL17,
  author       = {Xinwei Gao and
                  Jintai Ding and
                  Jiqiang Liu and
                  Lin Li},
  title        = {Post-Quantum Secure Remote Password Protocol from {RLWE} Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1196},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1196},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoDLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoDLRL17,
  author       = {Xinwei Gao and
                  Jintai Ding and
                  Lin Li and
                  Saraswathy RV and
                  Jiqiang Liu},
  title        = {Efficient Implementation of Password-Based Authenticated Key Exchange
                  from {RLWE} and Post-Quantum {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1192},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1192},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoDLRL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoDRLL17,
  author       = {Xinwei Gao and
                  Jintai Ding and
                  Saraswathy RV and
                  Lin Li and
                  Jiqiang Liu},
  title        = {Comparison analysis and efficient implementation of reconciliation-based
                  {RLWE} key exchange protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1178},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1178},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoDRLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayIOZ17,
  author       = {Juan A. Garay and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {The Price of Low Communication in Secure Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayIOZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKP17,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Giorgos Panagiotakos},
  title        = {Proofs of Work for Blockchain Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {775},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/775},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargKP17,
  author       = {Sanjam Garg and
                  Susumu Kiyoshima and
                  Omkant Pandey},
  title        = {On the Exact Round Complexity of Self-Composable Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/124},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMM17,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/541},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMM17a,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {When does Functional Encryption Imply Obfuscation?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {943},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/943},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMMM17,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Daniel Masny and
                  Izaak Meckler},
  title        = {On the Round Complexity of {OT} Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1187},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1187},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargS17,
  author       = {Sanjam Garg and
                  Akshayaram Srinivasan},
  title        = {Garbled Protocols and Two-Round {MPC} from Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1004},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargS17a,
  author       = {Sanjam Garg and
                  Akshayaram Srinivasan},
  title        = {Two-Round Multiparty Secure Computation from Minimal Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1156},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1156},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargYZ17,
  author       = {Sumegha Garg and
                  Henry Yuen and
                  Mark Zhandry},
  title        = {New security notions and feasibility results for authentication of
                  quantum data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GayHK17,
  author       = {Romain Gay and
                  Dennis Hofheinz and
                  Lisa Kohl},
  title        = {Kurosawa-Desmedt Meets Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/525},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GayHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPR17,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Michal Ryb{\'{a}}r},
  title        = {The Exact Security of {PMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GelinW17,
  author       = {Alexandre G{\'{e}}lin and
                  Benjamin Wesolowski},
  title        = {Loop-abort faults on supersingular isogeny cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GelinW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GencIR17,
  author       = {Ziya Alper Gen{\c{c}} and
                  Vincenzo Iovino and
                  Alfredo Rial},
  title        = {"The Simplest Protocol for Oblivious Transfer" Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GencIR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeniseM17,
  author       = {Nicholas Genise and
                  Daniele Micciancio},
  title        = {Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeniseM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIW17,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  title        = {How to Construct a Leakage-Resilient (Stateless) Trusted Party},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {926},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/926},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinIW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinVY17,
  author       = {Daniel Genkin and
                  Luke Valenta and
                  Yuval Yarom},
  title        = {May the Fourth Be With You: {A} Microarchitectural Side Channel Attack
                  on Several Real-World Applications of Curve25519},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {806},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/806},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinVY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeorgescuPST17,
  author       = {Carmina Georgescu and
                  Alina Petrescu{-}Nita and
                  Emil Simion and
                  Antonela Toma},
  title        = {{NIST} Randomness Tests (in)dependence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeorgescuPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudNR17,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Razvan Rosie},
  title        = {Twisting Lattice and Graph Techniques to Compress Transactional Ledgers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/751},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraultLMS17,
  author       = {David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Marine Minier and
                  Christine Solnon},
  title        = {Revisiting {AES} Related-Key Differential Attacks with Constraint
                  Programming},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraultLMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ghadafi17,
  author       = {Essam Ghadafi},
  title        = {Efficient Round-Optimal Blind Signatures in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ghadafi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ghadafi17a,
  author       = {Essam Ghadafi},
  title        = {How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman
                  Vectors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/902},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ghadafi17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhadafiG17,
  author       = {Essam Ghadafi and
                  Jens Groth},
  title        = {Towards a Classification of Non-interactive Computational Assumptions
                  in Cyclic Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhadafiG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhafariH17,
  author       = {Vahid Amin Ghafari and
                  Honggang Hu},
  title        = {A new chosen {IV} statistical distinguishing framework to attack symmetric
                  ciphers, and its application to ACORN-v3 and Grain-128a},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1103},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhafariH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhafariHa17,
  author       = {Vahid Amin Ghafari and
                  Honggang Hu and
                  Mohammadsadegh alizadeh},
  title        = {Necessary conditions for designing secure stream ciphers with the
                  minimal internal states},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/765},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhafariHa17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GharahiK17,
  author       = {Motahhareh Gharahi and
                  Shahram Khazaei},
  title        = {Optimal Linear Secret Sharing Schemes for Graph Access Structures
                  on Six Participants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1232},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GharahiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ghosal17,
  author       = {Riddhi Ghosal},
  title        = {Analysing Relations involving small number of Monomials in {AES} {S-}
                  Box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ghosal17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshN17,
  author       = {Satrajit Ghosh and
                  Tobias Nilges},
  title        = {An Algebraic Approach to Maliciously Secure Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1064},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshNN17,
  author       = {Satrajit Ghosh and
                  Jesper Buus Nielsen and
                  Tobias Nilges},
  title        = {Maliciously Secure Oblivious Linear Function Evaluation with Constant
                  Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshalC17,
  author       = {Ashrujit Ghoshal and
                  Thomas De Cnudde},
  title        = {Several Masked Implementations of the Boyar-Peralta {AES} S-Box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1023},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshalC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiacomelliJJPY17,
  author       = {Irene Giacomelli and
                  Somesh Jha and
                  Marc Joye and
                  C. David Page and
                  Kyonghwan Yoon},
  title        = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/979},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiacomelliJJPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiacomelliJPY17,
  author       = {Irene Giacomelli and
                  Somesh Jha and
                  C. David Page and
                  Kyonghwan Yoon},
  title        = {Privacy-Preserving Ridge Regression on Distributed Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiacomelliJPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiaconKP17,
  author       = {Federico Giacon and
                  Eike Kiltz and
                  Bertram Poettering},
  title        = {Hybrid Encryption in a Multi-User Setting, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {843},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/843},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiaconKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiladHMVZ17,
  author       = {Yossi Gilad and
                  Rotem Hemo and
                  Silvio Micali and
                  Georgios Vlachos and
                  Nickolai Zeldovich},
  title        = {Algorand: Scaling Byzantine Agreements for Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiladHMVZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiraudABL17,
  author       = {Matthieu Giraud and
                  Alexandre Anzala{-}Yamajako and
                  Olivier Bernard and
                  Pascal Lafourcade},
  title        = {Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/046},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiraudABL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GjosteenS17,
  author       = {Kristian Gj{\o}steen and
                  Martin Strand},
  title        = {A roadmap to fully homomorphic elections: Stronger security, better
                  verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GjosteenS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKW17,
  author       = {Shafi Goldwasser and
                  Saleet Klein and
                  Daniel Wichs},
  title        = {The Edited Truth},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gonzalez17,
  author       = {Alonso Gonz{\'{a}}lez},
  title        = {A Ring Signature of size {\(\Theta\)}(sqrt[3]\{n\}) without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {905},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/905},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gonzalez17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GopfertVW17,
  author       = {Florian G{\"{o}}pfert and
                  Christine van Vredendaal and
                  Thomas Wunderer},
  title        = {A Quantum Attack on {LWE} with Arbitrary Error Distribution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GopfertVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorkeJAC17,
  author       = {Christian A. Gorke and
                  Christian Janson and
                  Frederik Armknecht and
                  Carlos Cid},
  title        = {Cloud Storage File Recoverability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorkeJAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gorodilova17,
  author       = {Anastasiya Gorodilova},
  title        = {On differential equivalence of {APN} functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {907},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/907},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gorodilova17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoudarziJR17,
  author       = {Dahmun Goudarzi and
                  Antoine Joux and
                  Matthieu Rivain},
  title        = {How to Securely Compute with Noisy Leakage in Quasilinear Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {929},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/929},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoudarziJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoudarziRVV17,
  author       = {Dahmun Goudarzi and
                  Matthieu Rivain and
                  Damien Vergnaud and
                  Srinivas Vivek},
  title        = {Generalized Polynomial Decomposition for S-boxes with Application
                  to Side-Channel Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/632},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GoudarziRVV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalG17,
  author       = {Rishab Goyal and
                  Vipul Goyal},
  title        = {Overcoming Cryptographic Impossibility Results using Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {935},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/935},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalHKW17,
  author       = {Rishab Goyal and
                  Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  title        = {A Generic Approach to Constructing and Proving Verifiable Random Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalHKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKRW17,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Andrew Russell and
                  Brent Waters},
  title        = {Risky Traitor Tracing and New Differential Privacy Negative Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1117},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW17,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Separating Semantic and Circular Security for Symmetric-Key Bit Encryption
                  from the Learning with Errors Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW17a,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Separating {IND-CPA} and Circular Security for Unbounded Length Key
                  Cycles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW17b,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Lockable Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrassiR17,
  author       = {Lorenzo Grassi and
                  Christian Rechberger},
  title        = {New Limits for {AES} Known-Key Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrassiR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrassiRR17,
  author       = {Lorenzo Grassi and
                  Christian Rechberger and
                  Sondre R{\o}njom},
  title        = {A New Structural-Differential Property of 5-Round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrassiRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreveRFY17,
  author       = {Bj{\o}rn M{\o}ller Greve and
                  H{\aa}vard Raddum and
                  Gunnar Fl{\o}ystad and
                  {\O}yvind Ytrehus},
  title        = {Eliminating Variables in Boolean Equation Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1027},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreveRFY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossIB17,
  author       = {Hannes Gro{\ss} and
                  Rinat Iusupov and
                  Roderick Bloem},
  title        = {Generic Low-Latency Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1223},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1223},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossIB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossM17,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard},
  title        = {Reconciling d+1Masking in Hardware and Software},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossSM17,
  author       = {Hannes Gro{\ss} and
                  David Schaffenrath and
                  Stefan Mangard},
  title        = {Higher-Order Side-Channel Protected Implementations of Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossoS17,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Masking Proofs are Tight (and How to Exploit it in Security Evaluations)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrothM17,
  author       = {Jens Groth and
                  Mary Maller},
  title        = {Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable
                  SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/540},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrothM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsLR17,
  author       = {Paul Grubbs and
                  Jiahui Lu and
                  Thomas Ristenpart},
  title        = {Message Franking via Committing Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/664},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsRS17,
  author       = {Paul Grubbs and
                  Thomas Ristenpart and
                  Vitaly Shmatikov},
  title        = {Why Your Encrypted Database Is Not Secure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsRY17,
  author       = {Paul Grubbs and
                  Thomas Ristenpart and
                  Yuval Yarom},
  title        = {Modifying an Enciphering Scheme after Deployment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsRY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu17,
  author       = {Chunsheng Gu},
  title        = {Multilinear Maps Using a Variant of Ring-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu17a,
  author       = {Chunsheng Gu},
  title        = {Integer Version of Ring-LWE and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {641},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/641},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu17b,
  author       = {Chunsheng Gu},
  title        = {Cryptanalysis of indistinguishability obfuscation using {GGH13} without
                  ideals},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1159},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronL17,
  author       = {Shay Gueron and
                  Yehuda Lindell},
  title        = {Better Bounds for Block Cipher Modes of Operation via Nonce-Based
                  Key Derivation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronLL17,
  author       = {Shay Gueron and
                  Adam Langley and
                  Yehuda Lindell},
  title        = {{AES-GCM-SIV:} Specification and Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronM17,
  author       = {Shay Gueron and
                  Nicky Mouha},
  title        = {SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/645},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilhemSW17,
  author       = {Cyprien de Saint Guilhem and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Generic Forward-Secure Key Agreement Without Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/853},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilhemSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilleyL17,
  author       = {Sylvain Guilley and
                  Liran Lerman},
  title        = {Bivariate attacks and confusion coefficients},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilleyL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GulmezogluES17,
  author       = {Berk G{\"{u}}lmezoglu and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {Cache-Base Application Detection in the Cloud Using Machine Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GulmezogluES17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuntherHJL17,
  author       = {Felix G{\"{u}}nther and
                  Britta Hale and
                  Tibor Jager and
                  Sebastian Lauer},
  title        = {0-RTT Key Exchange with Full Forward Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuntherHJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuntherK017,
  author       = {Daniel G{\"{u}}nther and
                  {\'{A}}gnes Kiss and
                  Thomas Schneider},
  title        = {More Efficient Universal Circuit Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {798},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/798},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuntherK017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuntherM17,
  author       = {Felix G{\"{u}}nther and
                  Sogol Mazaheri},
  title        = {A Formal Treatment of Multi-key Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuntherM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoCSLYM17,
  author       = {Fuchun Guo and
                  Rongmao Chen and
                  Willy Susilo and
                  Jianchang Lai and
                  Guomin Yang and
                  Yi Mu},
  title        = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities
                  with {A} Counterexample},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoCSLYM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoDCS17,
  author       = {Wanfen Guo and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jiachen Shen},
  title        = {Efficient Attribute-Based Secure Keyword Search on the Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {782},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/782},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoDCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GurPRRS17,
  author       = {Kamil Doruk G{\"{u}}r and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Gerard W. Ryan and
                  Erkay Savas},
  title        = {Implementation and Evaluation of Improved Gaussian Sampling for Lattice
                  Trapdoors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GurPRRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GurPRRSS17,
  author       = {Kamil Doruk G{\"{u}}r and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Gerard W. Ryan and
                  Hadi Sajjadpour and
                  Erkay Savas},
  title        = {Practical Applications of Improved Gaussian Sampling for Trapdoor
                  Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1254},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GurPRRSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gvili17,
  author       = {Yaron Gvili},
  title        = {How to Prove Megabytes (Per Second)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {846},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/846},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gvili17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaaseL17,
  author       = {Bj{\"{o}}rn Haase and
                  Beno{\^{\i}}t Labrique},
  title        = {Making Password Authenticated Key Exchange Suitable For Resource-Constrained
                  Industrial Control Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaaseL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaenniKLD17,
  author       = {Rolf Haenni and
                  Reto E. Koenig and
                  Philipp Locher and
                  Eric Dubuis},
  title        = {CHVote System Specification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaenniKLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HafizH17,
  author       = {Syed Mahbub Hafiz and
                  Ryan Henry},
  title        = {Querying for Queries: Indexes of Queries for Efficient and Expressive
                  {IT-PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {825},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/825},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HafizH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiK17,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security
                  Notions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviHPV17,
  author       = {Shai Halevi and
                  Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Round-Optimal Secure Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1056},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviHPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviHSS17,
  author       = {Shai Halevi and
                  Tzipora Halevi and
                  Victor Shoup and
                  Noah Stephens{-}Davidowitz},
  title        = {Implementing BP-Obfuscation Using Graph-Induced Encoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviHSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviI0KSY17,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Abhishek Jain and
                  Ilan Komargodski and
                  Amit Sahai and
                  Eylon Yogev},
  title        = {Non-Interactive Multiparty Computation without Correlated Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {871},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/871},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviI0KSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamann0M17,
  author       = {Matthias Hamann and
                  Matthias Krause and
                  Willi Meier},
  title        = {A Note on Stream Ciphers that Continuously Use the {IV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1172},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamann0M17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamann0MZ17,
  author       = {Matthias Hamann and
                  Matthias Krause and
                  Willi Meier and
                  Bin Zhang},
  title        = {Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamann0MZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamburg17,
  author       = {Mike Hamburg},
  title        = {The {STROBE} protocol framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamburg17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamburg17a,
  author       = {Mike Hamburg},
  title        = {Cryptanalysis of 22 1/2 rounds of Gimli},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamburg17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanL17,
  author       = {Shuai Han and
                  Shengli Liu},
  title        = {KDM-Secure Public-Key Encryption from Constant-Noise {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/310},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoCRS17,
  author       = {Feng Hao and
                  Dylan Clarke and
                  Brian Randell and
                  Siamak F. Shahandashti},
  title        = {Verifiable Classroom Voting in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/056},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaoCRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hars17,
  author       = {Laszlo Hars},
  title        = {Hardware Bit-Mixers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hars17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hars17a,
  author       = {Laszlo Hars},
  title        = {Information Security Applications of Bit-Mixers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hars17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HartKMPPQ17,
  author       = {Daniel Hart and
                  DoHoon Kim and
                  Giacomo Micheli and
                  Guillermo Pascual{-}Perez and
                  Christophe Petit and
                  Yuxuan Quek},
  title        = {A Practical Cryptanalysis of WalnutDSA},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1160},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1160},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HartKMPPQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hartung17,
  author       = {Gunnar Hartung},
  title        = {Attacks on Secure Logging Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hartung17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HartungK0KH17,
  author       = {Gunnar Hartung and
                  Bj{\"{o}}rn Kaidel and
                  Alexander Koch and
                  Jessica Koch and
                  Dominik Hartmann},
  title        = {Practical and Robust Secure Logging from Fault-Tolerant Sequential
                  Aggregate Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {949},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/949},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HartungK0KH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hashimoto17,
  author       = {Yasufumi Hashimoto},
  title        = {On the security of HMFEv},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {689},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/689},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hashimoto17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HauckL17,
  author       = {Eduard Hauck and
                  Julian Loss},
  title        = {Efficient and Universally Composable Protocols for Oblivious Transfer
                  from the {CDH} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1011},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HauckL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HayashiK17,
  author       = {Masahito Hayashi and
                  Takeshi Koshiba},
  title        = {Universal Construction of Cheater-Identifiable Secret Sharing Against
                  Rushing Cheaters without Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HayashiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayIV17,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Actively Secure Garbled Circuits with Constant Communication Overhead
                  in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {947},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/947},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayPV17,
  author       = {Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazaySS17,
  author       = {Carmit Hazay and
                  Peter Scholl and
                  Eduardo Soria{-}Vazquez},
  title        = {Low Cost Constant Round {MPC} Combining {BMR} and Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazaySS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV17,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Scalable Multi-Party Private Set-Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hee17,
  author       = {Juay Guan Hee},
  title        = {An Attempt to Cryptanalyze {A} Partially Known Cipher Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {589},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/589},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hee17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerbertF17,
  author       = {Vincent Herbert and
                  Caroline Fontaine},
  title        = {Software Implementation of 2-Depth Pairing-based Homomorphic Encryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerbertF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerderFDD17,
  author       = {Charles Herder and
                  Benjamin Fuller and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Public Key Cryptosystems with Noisy Secret Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/210},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerderFDD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Herold0KRR17,
  author       = {Gottfried Herold and
                  Max Hoffmann and
                  Michael Kloo{\ss} and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  title        = {New Techniques for Structural Batch Verification in Bilinear Groups
                  with Applications to Groth-Sahai Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {802},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/802},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Herold0KRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeroldK17,
  author       = {Gottfried Herold and
                  Elena Kirshanova},
  title        = {Improved Algorithms for the Approximate k-List Problem in Euclidean
                  Norm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeroldK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeroldKL17,
  author       = {Gottfried Herold and
                  Elena Kirshanova and
                  Thijs Laarhoven},
  title        = {Speed-ups and time-memory trade-offs for tuple lattice sieving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1228},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeroldKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Herranz17,
  author       = {Javier Herranz},
  title        = {Attribute-Based Encryption Implies Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Herranz17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuserPGM17,
  author       = {Annelie Heuser and
                  Stjepan Picek and
                  Sylvain Guilley and
                  Nele Mentens},
  title        = {Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal
                  Easy?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuserPGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HilbertJLJ17,
  author       = {Nicholas Hilbert and
                  Christian S. Jensen and
                  Dan Lin and
                  Wei Jiang},
  title        = {UFace: Your Universal Password That No One Can See},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HilbertJLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HiromasaK17,
  author       = {Ryo Hiromasa and
                  Yutaka Kawai},
  title        = {Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HiromasaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HiroseSY17,
  author       = {Shoichi Hirose and
                  Yu Sasaki and
                  Kan Yasuda},
  title        = {Message-Recovery MACs and Verification-Unskippable {AE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HiroseSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangOHY17,
  author       = {Thang Hoang and
                  Ceyhun D. Ozkaptan and
                  Gabriel Hackebeil and
                  Attila A. Yavuz},
  title        = {Efficient Oblivious Data Structures for Database Services on the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1238},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangOHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangOYGN17,
  author       = {Thang Hoang and
                  Ceyhun D. Ozkaptan and
                  Attila A. Yavuz and
                  Jorge Guajardo and
                  Tam Nguyen},
  title        = {{S3ORAM:} {A} Computation-Efficient and Constant Client Bandwidth
                  Blowup {ORAM} with Shamir Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/819},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangOYGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangT17,
  author       = {Viet Tung Hoang and
                  Stefano Tessaro},
  title        = {The Multi-User Security of Double Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangYDG17,
  author       = {Thang Hoang and
                  Attila A. Yavuz and
                  F. Bet{\"{u}}l Durak and
                  Jorge Guajardo},
  title        = {Oblivious Dynamic Searchable Encryption via Distributed {PIR} and
                  {ORAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1158},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangYDG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangYG17,
  author       = {Thang Hoang and
                  Attila A. Yavuz and
                  Jorge Guajardo},
  title        = {A High-Security Searchable Encryption Framework for Privacy-Critical
                  Cloud Storage Services},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1237},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangYG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffsteinPWZ17,
  author       = {Jeffrey Hoffstein and
                  Jill Pipher and
                  William Whyte and
                  Zhenfei Zhang},
  title        = {A signature scheme from Learning with Truncation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {995},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/995},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffsteinPWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzHK17,
  author       = {Dennis Hofheinz and
                  Kathrin H{\"{o}}velmanns and
                  Eike Kiltz},
  title        = {A Modular Analysis of the Fujisaki-Okamoto Transformation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HolmgrenY17,
  author       = {Justin Holmgren and
                  Lisa Yang},
  title        = {{(A} Counterexample to) Parallel Repetition for Non-Signaling Multi-Player
                  Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1138},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HolmgrenY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HolzerW17,
  author       = {Patrick Holzer and
                  Thomas Wunderer},
  title        = {Recovering Short Generators of Principal Fractional Ideals in Cyclotomic
                  Fields of Conductor p\({}^{\mbox{{\(\alpha\)}}}\) q\({}^{\mbox{{\(\beta\)}}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/513},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HolzerW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaS17,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki},
  title        = {Cryptanalysis against Symmetric-Key Schemes with Online Classical
                  Queries and Offline Quantum Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {977},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/977},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaS17a,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki},
  title        = {Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1229},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaSX17,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki and
                  Keita Xagawa},
  title        = {Quantum Multicollision-Finding Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {864},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/864},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaSX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoweO17,
  author       = {James Howe and
                  M{\'{a}}ire O'Neill},
  title        = {{GLITCH:} {A} Discrete Gaussian Testing Suite For Lattice-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoweO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuLT17,
  author       = {Jiao Hu and
                  Ruilin Li and
                  Chaojing Tang},
  title        = {A Real-time Inversion Attack on the {GMR-2} Cipher Used in the Satellite
                  Phones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangH17,
  author       = {Qiong Huang and
                  Jianye Huang},
  title        = {Black-Box Constructions of Signature Schemes in the Bounded Leakage
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/619},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hulsing0S17,
  author       = {Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Kit Smeets},
  title        = {Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based
                  Crypto},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1025},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hulsing0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hulsing17,
  author       = {Andreas H{\"{u}}lsing},
  title        = {{WOTS+} - Shorter Signatures for Hash-Based Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {965},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/965},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hulsing17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HulsingRB17,
  author       = {Andreas H{\"{u}}lsing and
                  Lea Rausch and
                  Johannes Buchmann},
  title        = {Optimal Parameters for {XMSSMT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {966},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/966},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HulsingRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HulsingRSS17,
  author       = {Andreas H{\"{u}}lsing and
                  Joost Rijneveld and
                  John M. Schanck and
                  Peter Schwabe},
  title        = {High-speed key encapsulation from {NTRU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {667},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/667},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HulsingRSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hurley-SmithH17,
  author       = {Darren Hurley{-}Smith and
                  Julio Hernandez{-}Castro},
  title        = {Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {842},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/842},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hurley-SmithH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HutchinsonK17,
  author       = {Aaron Hutchinson and
                  Koray Karabina},
  title        = {Constructing Multidimensional Differential Addition Chains and their
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HutchinsonK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ImmlerHLLW17,
  author       = {Vincent Immler and
                  Matthias Hiller and
                  Qinzhi Liu and
                  Andreas Lenz and
                  Antonia Wachter{-}Zeh},
  title        = {Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order
                  Alphabet PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {911},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/911},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ImmlerHLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ImmlerSU17,
  author       = {Vincent Immler and
                  Robert Specht and
                  Florian Unterstein},
  title        = {Your Rails Cannot Hide From Localized {EM:} How Dual-Rail Logic Fails
                  on FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {608},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/608},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ImmlerSU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InasawaY17,
  author       = {Keita Inasawa and
                  Kenji Yasunaga},
  title        = {Rational Proofs against Rational Verifiers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InasawaY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonKNPSSSY17,
  author       = {Mihaela Ion and
                  Ben Kreuter and
                  Erhan Nergiz and
                  Sarvar Patel and
                  Shobhit Saxena and
                  Karn Seth and
                  David Shanahan and
                  Moti Yung},
  title        = {Private Intersection-Sum Protocol with Applications to Attributing
                  Aggregate Ad Conversions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {738},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/738},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonKNPSSSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiW17,
  author       = {Yuval Ishai and
                  Mor Weiss},
  title        = {Probabilistically Checkable Proofs of Proximity with Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeS17,
  author       = {Takanori Isobe and
                  Kyoji Shibutani},
  title        = {New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {868},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/868},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ItkisSVWY17,
  author       = {Gene Itkis and
                  Emily Shen and
                  Mayank Varia and
                  David Wilson and
                  Arkady Yerukhimovich},
  title        = {Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ItkisSVWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataMPS17,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Thomas Peyrin and
                  Yannick Seurin},
  title        = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message
                  Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataS17,
  author       = {Tetsu Iwata and
                  Yannick Seurin},
  title        = {Reconsidering the Security Bound of {AES-GCM-SIV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JacobHZRS17,
  author       = {Nisha Jacob and
                  Johann Heyszl and
                  Andreas Zankl and
                  Carsten Rolfes and
                  Georg Sigl},
  title        = {How to Break Secure Boot on {FPGA} SoCs through Malicious Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JacobHZRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JacommeKS17,
  author       = {Charlie Jacomme and
                  Steve Kremer and
                  Guillaume Scerri},
  title        = {Symbolic Models for Isolated Execution Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JacommeKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JafargholiKKKPW17,
  author       = {Zahra Jafargholi and
                  Chethan Kamath and
                  Karen Klein and
                  Ilan Komargodski and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Be Adaptive, Avoid Overcommitting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/515},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JafargholiKKKPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JafargholiSW17,
  author       = {Zahra Jafargholi and
                  Alessandra Scafuro and
                  Daniel Wichs},
  title        = {Adaptively Indistinguishable Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {934},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/934},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JafargholiSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerK17,
  author       = {Tibor Jager and
                  Rafael Kurek},
  title        = {Continuous Collision Resistance and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerSSW17,
  author       = {Tibor Jager and
                  Martijn Stam and
                  Ryan Stanley{-}Oakes and
                  Bogdan Warinschi},
  title        = {Multi-Key Authenticated Encryption with Corruptions: Reductions are
                  Lossy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/495},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainKKR17,
  author       = {Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Ron Rothblum},
  title        = {Distinguisher-Dependent Simulation in Two Rounds and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/330},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainKKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainRS17,
  author       = {Aayush Jain and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  title        = {Threshold Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JamshidpourA17,
  author       = {Sadegh Jamshidpour and
                  Zahra Ahmadian},
  title        = {Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using
                  Linear Subspace Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1099},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JamshidpourA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKKX17,
  author       = {Stanislaw Jarecki and
                  Aggelos Kiayias and
                  Hugo Krawczyk and
                  Jiayu Xu},
  title        = {{TOPPSS:} Cost-minimal Password-Protected Secret Sharing based on
                  Threshold {OPRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKKX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaschkeA17,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  title        = {(Finite) Field Work: Choosing the Best Encoding of Numbers for {FHE}
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaschkeA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaschkeGAS17,
  author       = {Angela J{\"{a}}schke and
                  Bj{\"{o}}rn Grohmann and
                  Frederik Armknecht and
                  Andreas Schaad},
  title        = {Industrial Feasibility of Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {813},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/813},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaschkeGAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanMPS17,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Amir Moradi and
                  Thomas Peyrin and
                  Pascal Sasdrich},
  title        = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations
                  of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanPS17,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin and
                  Siang Meng Sim},
  title        = {Optimizing Implementations of Lightweight Building Blocks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JetchevW17,
  author       = {Dimitar Jetchev and
                  Benjamin Wesolowski},
  title        = {Horizontal isogeny graphs of ordinary abelian varieties and the discrete
                  logarithm problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JetchevW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhaLMMN17,
  author       = {Ashwin Jha and
                  Eik List and
                  Kazuhiko Minematsu and
                  Sweta Mishra and
                  Mridul Nandi},
  title        = {{XHX} - {A} Framework for Optimally Secure Tweakable Block Ciphers
                  from Classical Block Ciphers and Universal Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1075},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1075},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JhaLMMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhaMN17,
  author       = {Ashwin Jha and
                  Avradip Mandal and
                  Mridul Nandi},
  title        = {On The Exact Security of Message Authentication Using Pseudorandom
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/172},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JhaMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiaTMGSL17,
  author       = {Yaoqi Jia and
                  Shruti Tople and
                  Tarik Moataz and
                  Deli Gong and
                  Prateek Saxena and
                  Zhenkai Liang},
  title        = {Robust Synchronous {P2P} Primitives Using {SGX} Enclaves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiaTMGSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangZCWM17,
  author       = {Haodong Jiang and
                  Zhenfeng Zhang and
                  Long Chen and
                  Hong Wang and
                  Zhi Ma},
  title        = {Post-quantum IND-CCA-secure {KEM} without Additional Hash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1096},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1096},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangZCWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinZ17,
  author       = {Zhengzhong Jin and
                  Yunlei Zhao},
  title        = {Optimal Key Consensus in Presence of Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1058},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Johnston17,
  author       = {Anna Johnston},
  title        = {Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Johnston17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Johnston17a,
  author       = {Anna Johnston},
  title        = {Dispersed Cryptography and the Quotient Ring Transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Johnston17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JostM17,
  author       = {Daniel Jost and
                  Ueli Maurer},
  title        = {Context-Restricted Indifferentiability: Generalizing {UCE} and Implications
                  on the Soundness of Hash-Function Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JostM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JostMR17,
  author       = {Daniel Jost and
                  Ueli Maurer and
                  Jo{\~{a}}o L. Ribeiro},
  title        = {Information-Theoretic Secret-Key Agreement: The Asymptotically Tight
                  Relation Between the Secret-Key Rate and the Channel Quality Ratio},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1130},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JostMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JournaultS17,
  author       = {Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Very High Order Masking: Efficient Implementation and Security Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/637},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JournaultS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxV17,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  title        = {A crossbred algorithm for solving Boolean polynomial systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joye17,
  author       = {Marc Joye},
  title        = {Privacy-Preserving Ridge Regression Without Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {732},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/732},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joye17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JudmayerZSVW17,
  author       = {Aljosha Judmayer and
                  Alexei Zamyatin and
                  Nicholas Stifter and
                  Artemios G. Voyiatzis and
                  Edgar R. Weippl},
  title        = {Merged Mining: Curse of Cure?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {791},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/791},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JudmayerZSVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JutlaR17,
  author       = {Charanjit S. Jutla and
                  Arnab Roy},
  title        = {Improved Structure Preserving Signatures under Standard Bilinear Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/025},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JutlaR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KachigarT17,
  author       = {Ghazal Kachigar and
                  Jean{-}Pierre Tillich},
  title        = {Quantum Information Set Decoding Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KachigarT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KacsmarPH17,
  author       = {Bailey Kacsmar and
                  Sarah Plosker and
                  Ryan Henry},
  title        = {Computing Low-Weight Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KacsmarPH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KajitaOF17,
  author       = {Kaisei Kajita and
                  Kazuto Ogawa and
                  Eiichiro Fujisaki},
  title        = {A Constant-Size Signature Scheme with a Tighter Reduction from the
                  {CDH} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1116},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KajitaOF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalesEM17,
  author       = {Daniel Kales and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Note on the Robustness of {CAESAR} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1137},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalesEM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kaliski17,
  author       = {Burton S. Kaliski Jr.},
  title        = {A Quantum "Magic Box" for the Discrete Logarithm Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {745},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/745},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kaliski17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamalI17,
  author       = {Ahmad Akmal Aminuddin Mohd Kamal and
                  Keiichi Iwamura},
  title        = {Conditionally Secure Secrecy Computation using Secret Sharing Scheme
                  for n{\textless}2k-1 (full paper)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamalI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamaraM17,
  author       = {Seny Kamara and
                  Tarik Moataz},
  title        = {Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear
                  Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamaraM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kaminsky17,
  author       = {Alan Kaminsky},
  title        = {ElsieFour: {A} Low-Tech Authenticated Encryption Algorithm For Human-to-Human
                  Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kaminsky17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KampanakisF17,
  author       = {Panos Kampanakis and
                  Scott R. Fluhrer},
  title        = {{LMS} vs {XMSS:} {A} comparison of the Stateful Hash-Based Signature
                  Proposed Standards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KampanakisF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KansalDM17,
  author       = {Meenakshi Kansal and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Forward Secure Efficient Group Signature in Dynamic Setting using
                  Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1128},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KansalDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KanukurthiOS17,
  author       = {Bhavana Kanukurthi and
                  Sai Lakshmi Bhavana Obbattu and
                  Sruthi Sekar},
  title        = {Four-state Non-malleable Codes with Explicit Constant Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {930},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/930},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KanukurthiOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KanukurthiOS17a,
  author       = {Bhavana Kanukurthi and
                  Sai Lakshmi Bhavana Obbattu and
                  Sruthi Sekar},
  title        = {Non-malleable Randomness Encoders and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1097},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KanukurthiOS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaptchukMG17,
  author       = {Gabriel Kaptchuk and
                  Ian Miers and
                  Matthew Green},
  title        = {Managing Secrets with Consensus Networks: Fairness, Ransomware and
                  Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaptchukMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaratiS17,
  author       = {Sabyasachi Karati and
                  Palash Sarkar},
  title        = {Connecting Legendre with Kummer and Edwards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1205},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaratiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarimiDLG17,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Florent Lozach and
                  Sylvain Guilley},
  title        = {Predictive Aging of Reliability of two Delay PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarimiDLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kastner0WMHMS17,
  author       = {Julia Kastner and
                  Alexander Koch and
                  Stefan Walzer and
                  Daiki Miyahara and
                  Yu{-}ichi Hayashi and
                  Takaaki Mizuki and
                  Hideaki Sone},
  title        = {The Minimum Number of Cards in Practical Card-based Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/863},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Kastner0WMHMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Katsumata17,
  author       = {Shuichi Katsumata},
  title        = {On the Untapped Potential of Encoding Predicates by Arithmetic Circuits
                  and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {808},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/808},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Katsumata17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzRW17,
  author       = {Jonathan Katz and
                  Samuel Ranellucci and
                  Xiao Wang},
  title        = {Authenticated Garbling and Communication-Efficient, Constant-Round,
                  Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzRW17a,
  author       = {Jonathan Katz and
                  Samuel Ranellucci and
                  Xiao Wang},
  title        = {Authenticated Garbling and Efficient Maliciously Secure Multi-Party
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzRW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerORSSV17,
  author       = {Marcel Keller and
                  Emmanuela Orsini and
                  Dragos Rotaru and
                  Peter Scholl and
                  Eduardo Soria{-}Vazquez and
                  Srinivas Vivek},
  title        = {Faster Secure Multi-Party Computation of {AES} and {DES} Using Lookup
                  Tables},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/378},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerORSSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerPR17,
  author       = {Marcel Keller and
                  Valerio Pastro and
                  Dragos Rotaru},
  title        = {Overdrive: Making {SPDZ} Great Again},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1230},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerRSW17,
  author       = {Marcel Keller and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Tim Wood},
  title        = {Reducing Communication Channels in {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerRSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerY17,
  author       = {Marcel Keller and
                  Avishay Yanai},
  title        = {Efficient Maliciously Secure Multiparty Computation for {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {981},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/981},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KempkaKS17,
  author       = {Carmen Kempka and
                  Ryo Kikuchi and
                  Koutarou Suzuki},
  title        = {How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KempkaKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhairallahCP17,
  author       = {Mustafa Khairallah and
                  Anupam Chattopadhyay and
                  Thomas Peyrin},
  title        = {Looting the LUTs : {FPGA} Optimization of {AES} and AES-like Ciphers
                  for Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1019},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhairallahCP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhalilG17,
  author       = {Rami Khalil and
                  Arthur Gervais},
  title        = {Revive: Rebalancing Off-Blockchain Payment Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {823},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/823},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhalilG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhandakerNGDNK17,
  author       = {Md. Al{-}Amin Khandaker and
                  Yuki Nanjo and
                  Loubna Ghammam and
                  Sylvain Duquesne and
                  Yasuyuki Nogami and
                  Yuta Kodera},
  title        = {Efficient Optimal Ate Pairing at 128-bit Security Level},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1174},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhandakerNGDNK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhanookiSP17,
  author       = {Hossein Arabnezhad{-}Khanoki and
                  Babak Sadeghiyan and
                  Josef Pieprzyk},
  title        = {Algebraic Attack Efficiency versus S-box Representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhanookiSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khurana17,
  author       = {Dakshita Khurana},
  title        = {Round Optimal Concurrent Non-Malleability from Polynomial Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {734},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/734},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khurana17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaS17,
  author       = {Dakshita Khurana and
                  Amit Sahai},
  title        = {Two-Message Non-Malleable Commitments from Standard Sub-exponential
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasLT17,
  author       = {Aggelos Kiayias and
                  Feng{-}Hao Liu and
                  Yiannis Tselekounis},
  title        = {Practical Non-Malleable Codes from {\(\mathscr{l}\)}-more Extractable
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasMZ17,
  author       = {Aggelos Kiayias and
                  Andrew Miller and
                  Dionysis Zindros},
  title        = {Non-Interactive Proofs of Proof-of-Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/963},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzL17,
  author       = {Eike Kiltz and
                  Julian Loss},
  title        = {The Algebraic Group Model and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/620},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzLP17,
  author       = {Eike Kiltz and
                  Julian Loss and
                  Jiaxin Pan},
  title        = {Tightly-Secure Signatures from Five-Move Identification Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/870},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzLS17,
  author       = {Eike Kiltz and
                  Vadim Lyubashevsky and
                  Christian Schaffner},
  title        = {A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {916},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/916},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimCKKH17,
  author       = {Kwang Ho Kim and
                  Junyop Choe and
                  Song Yun Kim and
                  Namsu Kim and
                  Sekung Hong},
  title        = {Speeding up Elliptic Curve Scalar Multiplication without Precomputation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {669},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/669},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimCKKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKHSH17,
  author       = {Seojin Kim and
                  HyungChul Kang and
                  Deukjo Hong and
                  Jaechul Sung and
                  Seokhie Hong},
  title        = {Efficient Differential Trail Searching Algorithm for {ARX} Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKHSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKS17,
  author       = {Sungwook Kim and
                  Jinsu Kim and
                  Jae Hong Seo},
  title        = {A New Approach for Practical Function-Private Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLLO17,
  author       = {Jihye Kim and
                  Seunghwa Lee and
                  Jiwon Lee and
                  Hyunok Oh},
  title        = {Combinatorial Subset Difference Public Key Broadcast Encryption Scheme
                  for Secure Multicast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLLO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimW17,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/380},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimW17a,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Access Control Encryption for General Policies from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/467},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimY17,
  author       = {Joo{-}Im Kim and
                  Ji Won Yoon},
  title        = {Honey Chatting: {A} novel instant messaging system robust to eavesdropping
                  over communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KissLSAP17,
  author       = {{\'{A}}gnes Kiss and
                  Jian Liu and
                  Thomas Schneider and
                  N. Asokan and
                  Benny Pinkas},
  title        = {Private Set Intersection for Unequal Set Sizes with Mobile Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/670},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KissLSAP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Indistinguishability Obfuscation: Simpler Constructions using Secret-Key
                  Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17a,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Indistinguishability Obfuscation for All Circuits from Secret-Key
                  Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17b,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {From Single-Key to Collusion-Resistant Secret-Key Functional Encryption
                  by Leveraging Succinctness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {638},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/638},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaT17,
  author       = {Fuyuki Kitagawa and
                  Keisuke Tanaka},
  title        = {Key Dependent Message Security and Receiver Selective Opening Security
                  for Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {987},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/987},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiyoshimaLV17,
  author       = {Susumu Kiyoshima and
                  Huijia Lin and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {A Unified Approach to Constructing Black-box {UC} Protocols in Trusted
                  Setup Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {944},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/944},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiyoshimaLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KleinjungDLPS17,
  author       = {Thorsten Kleinjung and
                  Claus Diem and
                  Arjen K. Lenstra and
                  Christine Priplata and
                  Colin Stahlke},
  title        = {Computation of a 768-bit prime field discrete logarithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KleinjungDLPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Koc17,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A New Algorithm for Inversion mod p\({}^{\mbox{k}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Koc17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kohel17,
  author       = {David Kohel},
  title        = {Twisted {\(\mu\)}\({}_{\mbox{4}}\)-normal form for elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kohel17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kokoris-KogiasJ17,
  author       = {Eleftherios Kokoris{-}Kogias and
                  Philipp Jovanovic and
                  Linus Gasser and
                  Nicolas Gailly and
                  Bryan Ford},
  title        = {OmniLedger: {A} Secure, Scale-Out, Decentralized Ledger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kokoris-KogiasJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kolbl17,
  author       = {Stefan K{\"{o}}lbl},
  title        = {Putting Wings on {SPHINCS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {898},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/898},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kolbl17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovMPRT17,
  author       = {Vladimir Kolesnikov and
                  Naor Matania and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {Practical Multi-party Private Set Intersection from Symmetric-Key
                  Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {799},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/799},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovMPRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovNRTT17,
  author       = {Vladimir Kolesnikov and
                  Jesper Buus Nielsen and
                  Mike Rosulek and
                  Ni Trieu and
                  Roberto Trifiletti},
  title        = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovNRTT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovRT17,
  author       = {Vladimir Kolesnikov and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {SWiM: Secure Wildcard Pattern Matching From {OT} Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1150},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiNY17,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiP17,
  author       = {Ilan Komargodski and
                  Anat Paskin{-}Cherniavsky},
  title        = {Evolving Secret Sharing: Dynamic Thresholds and Robustness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {948},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/948},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiS17,
  author       = {Ilan Komargodski and
                  Gil Segev},
  title        = {From Minicrypt to Obfustopia via Private-Key Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KondiP17,
  author       = {Yashvanth Kondi and
                  Arpita Patra},
  title        = {Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KondiP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppermannSHS17,
  author       = {Philipp Koppermann and
                  Fabrizio De Santis and
                  Johann Heyszl and
                  Georg Sigl},
  title        = {Fast {FPGA} Implementations of Diffie-Hellman on the Kummer Surface
                  of a Genus-2 Curve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {814},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/814},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppermannSHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaPW17,
  author       = {Venkata Koppula and
                  Andrew Poelstra and
                  Brent Waters},
  title        = {Universal Samplers with Fast Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KornaropoulosE17,
  author       = {Evgenios M. Kornaropoulos and
                  Petros Efstathopoulos},
  title        = {Breaking and Fixing Secure Similarity Approximations: Dealing with
                  Adversarially Perturbed Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {850},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/850},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KornaropoulosE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KowalczykMUW17,
  author       = {Lucas Kowalczyk and
                  Tal Malkin and
                  Jonathan R. Ullman and
                  Daniel Wichs},
  title        = {Hardness of Non-Interactive Differential Privacy from One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1107},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1107},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KowalczykMUW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KranzLSW17,
  author       = {Thorsten Kranz and
                  Gregor Leander and
                  Ko Stoffelen and
                  Friedrich Wiemer},
  title        = {Shorter Linear Straight-Line Programs for {MDS} Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1151},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KranzLSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KranzWL17,
  author       = {Thorsten Kranz and
                  Friedrich Wiemer and
                  Gregor Leander},
  title        = {Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KranzWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Krause17,
  author       = {Matthias Krause},
  title        = {On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data
                  Tradeoff Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Krause17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KubjasPW17,
  author       = {Ivo Kubjas and
                  Tiit Pikma and
                  Jan Willemson},
  title        = {Estonian Voting Verification Mechanism Revisited Again},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/081},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KubjasPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarFTS17,
  author       = {Amrit Kumar and
                  Cl{\'{e}}ment Fischer and
                  Shruti Tople and
                  Prateek Saxena},
  title        = {A Traceability Analysis of Monero's Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarFTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarHKC17,
  author       = {Sachin Kumar and
                  Jawad Haj{-}Yihia and
                  Mustafa Khairallah and
                  Anupam Chattopadhyay},
  title        = {A Comprehensive Performance Analysis of Hardware Implementations of
                  {CAESAR} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1261},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarHKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarPBMBCB17,
  author       = {S. V. Dilip Kumar and
                  Sikhar Patranabis and
                  Jakub Breier and
                  Debdeep Mukhopadhyay and
                  Shivam Bhasin and
                  Anupam Chattopadhyay and
                  Anubhab Baksi},
  title        = {A Practical Fault Attack on ARX-like Ciphers with a Case Study on
                  ChaCha20},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1074},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarPBMBCB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarPW17,
  author       = {Virendra Kumar and
                  Jonathan Petit and
                  William Whyte},
  title        = {Binary Hash Tree based Certificate Access Management},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/744},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarRA17,
  author       = {Rajendra Kumar and
                  Mahesh Sreekumar Rajasree and
                  Hoda Alkhzaimi},
  title        = {Cryptanalysis of 1-Round {KECCAK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1028},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1028},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarRA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuoLCHPCY17,
  author       = {Po{-}Chun Kuo and
                  Wen{-}Ding Li and
                  Yu{-}Wei Chen and
                  Yuan{-}Che Hsu and
                  Bo{-}Yuan Peng and
                  Chen{-}Mou Cheng and
                  Bo{-}Yin Yang},
  title        = {Post-Quantum Key Exchange on FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {690},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/690},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KuoLCHPCY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KushwahaM17,
  author       = {Prabhat Kushwaha and
                  Ayan Mahalanobis},
  title        = {A Probabilistic Baby-Step Giant-Step Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KushwahaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersR17,
  author       = {Ralf K{\"{u}}sters and
                  Daniel Rausch},
  title        = {A Framework for Universally Composable Diffie-Hellman Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kwant0T17,
  author       = {Robin Kwant and
                  Tanja Lange and
                  Kimberley Thissen},
  title        = {Lattice Klepto: Turning Post-Quantum Crypto Against Itself},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1140},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kwant0T17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LacBCFS17,
  author       = {Benjamin Lac and
                  Marc Beunardeau and
                  Anne Canteaut and
                  Jacques Fournier and
                  Renaud Sirdey},
  title        = {A First {DFA} on {PRIDE:} from Theory to Practice (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LacBCFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LacCFS17,
  author       = {Benjamin Lac and
                  Anne Canteaut and
                  Jacques Fournier and
                  Renaud Sirdey},
  title        = {{DFA} on LS-Designs with a Practical Implementation on {SCREAM} (extended
                  version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LacCFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LacCFS17a,
  author       = {Benjamin Lac and
                  Anne Canteaut and
                  Jacques J. A. Fournier and
                  Renaud Sirdey},
  title        = {Thwarting Fault Attacks using the Internal Redundancy Countermeasure
                  {(IRC)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {910},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/910},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LacCFS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LachariteMP17,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Brice Minaud and
                  Kenneth G. Paterson},
  title        = {Improved Reconstruction Attacks on Encrypted Data Using Range Query
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {701},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/701},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LachariteMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LachariteP17,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Kenneth G. Paterson},
  title        = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically
                  encrypted data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1068},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LachariteP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LafranceM17,
  author       = {Philip Lafrance and
                  Alfred Menezes},
  title        = {On the security of the {WOTS-PRF} signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {938},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/938},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LafranceM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiC17,
  author       = {Russell W. F. Lai and
                  Sherman S. M. Chow},
  title        = {Forward-Secure Searchable Encryption on Labeled Bipartite Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiZCS17,
  author       = {Russell W. F. Lai and
                  Tao Zhang and
                  Sherman S. M. Chow and
                  Dominique Schr{\"{o}}der},
  title        = {Efficient Sanitizable Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiZCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaingS17,
  author       = {Thalia M. Laing and
                  Douglas R. Stinson},
  title        = {A Survey and Refinement of Repairable Threshold Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1155},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaingS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Laird17,
  author       = {Paul Laird},
  title        = {On Two Round Rerunnable {MPC} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {912},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/912},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Laird17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LallemandR17,
  author       = {Virginie Lallemand and
                  Shahram Rasoolzadeh},
  title        = {Differential Cryptanalysis of 18-Round {PRIDE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1017},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LallemandR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LapetsVBJ17,
  author       = {Andrei Lapets and
                  Mayank Varia and
                  Azer Bestavros and
                  Frederick Jansen},
  title        = {Role-Based Ecosystem Model for Design, Development, and Deployment
                  of Secure Multi-Party Data Analytics Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {803},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/803},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LapetsVBJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterN17,
  author       = {Kristin E. Lauter and
                  Michael Naehrig},
  title        = {Cryptographic Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1108},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauterN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeanderM17,
  author       = {Gregor Leander and
                  Alexander May},
  title        = {Grover Meets Simon - Quantumly Attacking the FX-construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeanderM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lee17,
  author       = {Seungkwang Lee},
  title        = {A Masked White-box Cryptographic Implementation for Protecting against
                  Differential Computation Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lee17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeermakersS17,
  author       = {Daan Leermakers and
                  Boris Skoric},
  title        = {Optimal attacks on qubit-based Quantum Key Recycling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeermakersS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeermakersS17a,
  author       = {Daan Leermakers and
                  Boris Skoric},
  title        = {Security proof for Round Robin Differential Phase Shift {QKD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {830},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/830},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeermakersS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeibowitzPDH17,
  author       = {Hemi Leibowitz and
                  Ania M. Piotrowska and
                  George Danezis and
                  Amir Herzberg},
  title        = {No right to remain silent: Isolating Malicious Mixes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1000},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1000},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeibowitzPDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lenstra17,
  author       = {Arjen K. Lenstra},
  title        = {General purpose integer factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1087},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lenstra17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeontiadisL17,
  author       = {Iraklis Leontiadis and
                  Ming Li},
  title        = {Storage Efficient Substring Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/153},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LeontiadisL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeslieSS17,
  author       = {David S. Leslie and
                  Chris Sherfield and
                  Nigel P. Smart},
  title        = {Multi-Rate Threshold FlipThem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/611},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeslieSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LevillainTV17,
  author       = {Olivier Levillain and
                  Maxence Tury and
                  Nicolas Vivet},
  title        = {concerto: {A} Methodology Towards Reproducible Analyses of {TLS} Datasets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LevillainTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiAWW17,
  author       = {Taotao Li and
                  Parhat Abla and
                  Mingsheng Wang and
                  Qianwen Wei},
  title        = {Designing Proof of Transaction Puzzles for Cryptocurrency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1242},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiAWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiBDW17,
  author       = {Zheng Li and
                  Wenquan Bi and
                  Xiaoyang Dong and
                  Xiaoyun Wang},
  title        = {Improved Conditional Cube Attacks on Keccak Keyed Modes with {MILP}
                  Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {804},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/804},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiBDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiDW17,
  author       = {Zheng Li and
                  Xiaoyang Dong and
                  Xiaoyun Wang},
  title        = {Conditional Cube Attack on Round-Reduced {ASCON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/160},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLPX17,
  author       = {Haoyu Li and
                  Renzhang Liu and
                  Yanbin Pan and
                  Tianyuan Xie},
  title        = {Cryptanalysis of {HK17}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1259},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLPX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLXY17,
  author       = {Zhe Li and
                  San Ling and
                  Chaoping Xing and
                  Sze Ling Yeo},
  title        = {On the Closest Vector Problem for Lattices Constructed from Polynomials
                  and Their Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1002},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiMCQ17,
  author       = {Yin Li and
                  Xingpo Ma and
                  Qin Chen and
                  Chuanda Qi},
  title        = {Efficient Square-based Montgomery Multiplier for All Type {C.1} Pentanomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {836},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/836},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiMCQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiPN17,
  author       = {Hongda Li and
                  Dongxue Pan and
                  Peifang Ni},
  title        = {Augmented Black-Box Simulation and Zero Knowledge Argument for {NP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1243},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1243},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiPN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiS17,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge},
  title        = {No-Match Attacks and Robust Partnering Definitions - Defining Trivial
                  Attacks for Security Protocols is Not Trivial},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {818},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/818},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiTZ17,
  author       = {Huige Li and
                  Haibo Tian and
                  Fangguo Zhang},
  title        = {Block Chain based Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiW17,
  author       = {Chaoyun Li and
                  Qingju Wang},
  title        = {Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiW17a,
  author       = {Jing Li and
                  Licheng Wang},
  title        = {Noiseless Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {839},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/839},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWYL17,
  author       = {Ming Li and
                  Jian Weng and
                  Anjia Yang and
                  Wei Lu},
  title        = {CrowdBC: {A} Blockchain-based Decentralized Framework for Crowdsourcing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/444},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiXZ17,
  author       = {Bao{-}Hong Li and
                  Guoqing Xu and
                  Yin{-}Liang Zhao},
  title        = {Attribute-based concurrent signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiZL17,
  author       = {Yin Li and
                  Yu Zhang},
  title        = {Fast Montgomery-like Square Root Computation for All Trinomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/064},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangM17,
  author       = {Bei Liang and
                  Aikaterini Mitrokotsa},
  title        = {Fast and Adaptively Secure Signatures in the Random Oracle Model from
                  Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {969},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/969},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangY17,
  author       = {Min Liang and
                  Li Yang},
  title        = {Block encryption of quantum messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1247},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertLNW17,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to
                  E-Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/856},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertLNW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertSSS17,
  author       = {Beno{\^{\i}}t Libert and
                  Amin Sakzad and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext
                  Security from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {876},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/876},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinPS17,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Pratik Soni},
  title        = {Two-Round Concurrent Non-Malleable Commitment from Time-Lock Puzzles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinT17,
  author       = {Huijia Lin and
                  Stefano Tessaro},
  title        = {Indistinguishability Obfuscation from Bilinear Maps and Block-Wise
                  Local PRGs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lindell17,
  author       = {Yehuda Lindell},
  title        = {Fast Secure Two-Party {ECDSA} Signing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {552},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/552},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lindell17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellN17,
  author       = {Yehuda Lindell and
                  Ariel Nof},
  title        = {A Framework for Constructing Fast {MPC} over Arithmetic Circuits with
                  Malicious Adversaries and an Honest-Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {816},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/816},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellR17,
  author       = {Yehuda Lindell and
                  Tal Rabin},
  title        = {Secure Two-Party Computation with Fairness - {A} Necessary Design
                  Principle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/952},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellY17,
  author       = {Yehuda Lindell and
                  Avishay Yanai},
  title        = {Fast Garbling of Circuits over 3-Valued Logic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1225},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNWX17,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/353},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa17,
  author       = {Helger Lipmaa},
  title        = {Optimally Sound Sigma Protocols Under {DCRA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/703},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaP17,
  author       = {Helger Lipmaa and
                  Kateryna Pavlyk},
  title        = {A Simpler Rate-Optimal {CPIR} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {722},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/722},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Liskov17,
  author       = {Moses D. Liskov},
  title        = {A practical, perfectly secure password scheme in the bounded retrieval
                  model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {917},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/917},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Liskov17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LitosZ17,
  author       = {Orfeas Stefanos Thyfronitis Litos and
                  Dionysis Zindros},
  title        = {Trust Is Risk: {A} Decentralized Financial Trust Platform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LitosZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuDLA17,
  author       = {Jian Liu and
                  Li Duan and
                  Yong Li and
                  N. Asokan},
  title        = {Secure Deduplication of Encrypted Data: Refined Model and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuDLA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuJLA17,
  author       = {Jian Liu and
                  Mika Juuti and
                  Yao Lu and
                  N. Asokan},
  title        = {Oblivious Neural Network Predictions via MiniONN transformations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuJLA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuL17,
  author       = {Fanbao Liu and
                  Fengmei Liu},
  title        = {Universal Forgery with Birthday Paradox: Application to Blockcipher-based
                  Message Authentication Codes and Authenticated Encryptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/653},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuL17a,
  author       = {Fanbao Liu and
                  Fengmei Liu},
  title        = {Universal Forgery and Key Recovery Attacks: Application to FKS, {FKD}
                  and Keyak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/691},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLKN17,
  author       = {Dongxi Liu and
                  Nan Li and
                  Jongkil Kim and
                  Surya Nepal},
  title        = {Compact-LWE: Enabling Practically Lightweight Public Key Encryption
                  for Leveled IoT Device Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {685},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/685},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLKN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLW0LX17,
  author       = {Zheli Liu and
                  Siyi Lv and
                  Yu Wei and
                  Jin Li and
                  Joseph K. Liu and
                  Yang Xiang},
  title        = {{FFSSE:} Flexible Forward Secure Searchable Encryption with Efficient
                  Performance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1105},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLW0LX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLW17,
  author       = {Zhengbin Liu and
                  Yongqiang Li and
                  Mingsheng Wang},
  title        = {Optimal Differential Trails in SIMON-like Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/178},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLW17a,
  author       = {Zhengbin Liu and
                  Yongqiang Li and
                  Mingsheng Wang},
  title        = {The Security of SIMON-like Ciphers Against Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {576},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/576},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuMW17,
  author       = {Fukang Liu and
                  Florian Mendel and
                  Gaoli Wang},
  title        = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {800},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/800},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuR17,
  author       = {Yunwen Liu and
                  Vincent Rijmen},
  title        = {New Observations on Invariant Subspace Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuRDJ17,
  author       = {Hanqing Liu and
                  Na Ruan and
                  Rongtian Du and
                  Weijia Jia},
  title        = {On the Strategy and Behavior of Bitcoin Mining with N-attackers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1255},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1255},
  timestamp    = {Tue, 24 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuRDJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuVW17,
  author       = {Tianren Liu and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  title        = {New Protocols for Conditional Disclosure of Secrets (and More)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuVW17a,
  author       = {Tianren Liu and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  title        = {Towards Breaking the Exponential Barrier for General Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1062},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuVW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW17,
  author       = {Yi Liu and
                  Qi Wang},
  title        = {An E-voting Protocol Based on Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1043},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1043},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWRA17,
  author       = {Yunwen Liu and
                  Glenn De Witte and
                  Adri{\'{a}}n Ranea and
                  Tomer Ashur},
  title        = {Rotational-XOR Cryptanalysis of Reduced-round {SPECK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1036},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWRA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZ17,
  author       = {Qipeng Liu and
                  Mark Zhandry},
  title        = {Exploding Obfuscation: {A} Framework for Building Applications of
                  Obfuscation From Polynomial Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/209},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Loidreau17,
  author       = {Pierre Loidreau},
  title        = {A new rank metric codes based encryption scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Loidreau17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Loken17,
  author       = {Nils L{\"{o}}ken},
  title        = {Searchable Encryption with Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {679},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/679},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Loken17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LombardiV17,
  author       = {Alex Lombardi and
                  Vinod Vaikuntanathan},
  title        = {Minimizing the Complexity of Goldreich's Pseudorandom Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LombardiV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LombardiV17a,
  author       = {Alex Lombardi and
                  Vinod Vaikuntanathan},
  title        = {On the Non-Existence of Blockwise 2-Local PRGs with Applications to
                  Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LombardiV17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LovettZ17,
  author       = {Shachar Lovett and
                  Jiapeng Zhang},
  title        = {On the impossibility of entropy reversal, and its application to zero-knowledge
                  proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {922},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/922},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LovettZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lu17,
  author       = {Yi Lu},
  title        = {New Linear Attacks on Block Cipher {GOST}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoAFW17,
  author       = {Pei Luo and
                  Konstantinos Athanasiou and
                  Yunsi Fei and
                  Thomas Wahl},
  title        = {Algebraic Fault Analysis of {SHA-3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoAFW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoFZD17,
  author       = {Pei Luo and
                  Yunsi Fei and
                  Liwei Zhang and
                  A. Adam Ding},
  title        = {Differential Fault Analysis of {SHA-3} under Relaxed Fault Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {858},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/858},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoFZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL17,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Improvements for Finding Impossible Differentials of Block Cipher
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1209},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuVTS17,
  author       = {Loi Luu and
                  Yaron Velner and
                  Jason Teutsch and
                  Prateek Saxena},
  title        = {{SMART} {POOL} : Practical Decentralized Pooled Mining},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuVTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxMP17,
  author       = {Atul Luykx and
                  Bart Mennink and
                  Kenneth G. Paterson},
  title        = {Analyzing Multi-Key Security Degradation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LyubashevskyN17,
  author       = {Vadim Lyubashevsky and
                  Gregory Neven},
  title        = {One-Shot Verifiable Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LyubashevskyN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LyubashevskyS17,
  author       = {Vadim Lyubashevsky and
                  Gregor Seiler},
  title        = {Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge
                  Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LyubashevskyS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaDHZX17,
  author       = {Shunli Ma and
                  Yi Deng and
                  Debiao He and
                  Jiang Zhang and
                  Xiang Xie},
  title        = {An Efficient {NIZK} Scheme for Privacy-Preserving Transactions over
                  Account-Model Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1239},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1239},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaDHZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaZ17,
  author       = {Fermi Ma and
                  Mark Zhandry},
  title        = {Encryptor Combiners: {A} Unified Approach to Multiparty NIKE, (H)IBE,
                  and Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaZ17a,
  author       = {Fermi Ma and
                  Mark Zhandry},
  title        = {New Multilinear Maps from {CLT13} with Provable Security Against Zeroizing
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {946},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/946},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Macario-RatP17,
  author       = {Gilles Macario{-}Rat and
                  Jacques Patarin},
  title        = {Two-Face: New Public Key Multivariate Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1210},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Macario-RatP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaffeiMRS17,
  author       = {Matteo Maffei and
                  Giulio Malavolta and
                  Manuel Reinert and
                  Dominique Schr{\"{o}}der},
  title        = {Maliciously Secure Multi-Client {ORAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaffeiMRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahloujifarM17,
  author       = {Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors,
                  and Learners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {950},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/950},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahloujifarM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahriSBDW17,
  author       = {Hassan Qahur Al Mahri and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  title        = {Fault Attacks on {XEX} Mode with Application to certain Authenticated
                  Encryption Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {717},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/717},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahriSBDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaimutT17,
  author       = {Diana Maimut and
                  George Teseleanu},
  title        = {Secretly Embedding Trapdoors into Contract Signing Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaimutT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraS17,
  author       = {Subhamoy Maitra and
                  Akhilesh Siddhanti},
  title        = {A Differential Fault Attack on Plantlet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraSSAG17,
  author       = {Subhamoy Maitra and
                  Nishant Sinha and
                  Akhilesh Siddhanti and
                  Ravi Anand and
                  Sugata Gangopadhyay},
  title        = {A {TMDTO} Attack Against Lizard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {647},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/647},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraSSAG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MakriRSV17,
  author       = {Eleftheria Makri and
                  Dragos Rotaru and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {{PICS:} Private Image Classification with {SVM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1190},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MakriRSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalavoltaMKMR17,
  author       = {Giulio Malavolta and
                  Pedro Moreno{-}Sanchez and
                  Aniket Kate and
                  Matteo Maffei and
                  Srivatsan Ravi},
  title        = {Concurrency and Privacy with Payment-Channel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {820},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/820},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalavoltaMKMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalisaKKSC17,
  author       = {Luka Malisa and
                  Kari Kostiainen and
                  Thomas Knell and
                  David M. Sommer and
                  Srdjan Capkun},
  title        = {Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {584},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/584},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalisaKKSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalMMR17,
  author       = {Avradip Mandal and
                  John C. Mitchell and
                  Hart William Montgomery and
                  Arnab Roy},
  title        = {Privacy for Targeted Advertising},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/658},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalMMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MariotPLJ17,
  author       = {Luca Mariot and
                  Stjepan Picek and
                  Alberto Leporati and
                  Domagoj Jakobovic},
  title        = {Cellular Automata Based S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1055},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MariotPLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarohnWFRB17,
  author       = {Byron Marohn and
                  Charles V. Wright and
                  Wu{-}chi Feng and
                  Mike Rosulek and
                  Rakesh B. Bobba},
  title        = {Approximate Thumbnail Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1046},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1046},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarohnWFRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarsonP17,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  title        = {Security Notions for Bidirectional Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarsonP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarsonP17a,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  title        = {With one it is easy, with many it gets complicated: Understanding
                  Channel Security for Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/786},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarsonP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinMOS17,
  author       = {Daniel P. Martin and
                  Ashley Montanaro and
                  Elisabeth Oswald and
                  Dan J. Shepherd},
  title        = {Quantum Key Search with Side Channel Advice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinMOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Masny17,
  author       = {Daniel Masny},
  title        = {Authentication from Weak PRFs with Hidden Auxiliary Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {834},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/834},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Masny17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MateticAKDSGJC17,
  author       = {Sinisa Matetic and
                  Mansoor Ahmed and
                  Kari Kostiainen and
                  Aritra Dhar and
                  David M. Sommer and
                  Arthur Gervais and
                  Ari Juels and
                  Srdjan Capkun},
  title        = {{ROTE:} Rollback Protection for Trusted Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/048},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MateticAKDSGJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaximovS17,
  author       = {Alexander Maximov and
                  Helena Sjoberg},
  title        = {On Fast Multiplication in Binary Finite Fields and Optimal Primitive
                  Polynomials over {GF(2)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {889},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/889},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaximovS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MazloomG17,
  author       = {Sahar Mazloom and
                  S. Dov Gordon},
  title        = {Differentially Private Access Patterns in Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1016},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MazloomG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCannO17,
  author       = {David McCann and
                  Elisabeth Oswald},
  title        = {Practical Evaluation of Masking Software Countermeasures on an IoT
                  processor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCannO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCarthySO17,
  author       = {Sarah McCarthy and
                  Neil Smyth and
                  Elizabeth O'Sullivan},
  title        = {A Practical Implementation of Identity-Based Encryption over {NTRU}
                  Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1049},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCarthySO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCorryHM17,
  author       = {Patrick McCorry and
                  Ethan Heilman and
                  Andrew Miller},
  title        = {Atomically Trading with Roger: Gambling on the success of a hardfork},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {694},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/694},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCorryHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCorrySH17,
  author       = {Patrick McCorry and
                  Siamak F. Shahandashti and
                  Feng Hao},
  title        = {A Smart Contract for Boardroom Voting with Maximum Voter Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/110},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCorrySH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McGuireM17,
  author       = {Gary McGuire and
                  Daniela M{\"{u}}ller},
  title        = {A few more index calculus algorithms for the {ECDLP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1262},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McGuireM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McKagueE17,
  author       = {Matthew McKague and
                  David M. Eyers},
  title        = {Anonymous contribution of data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McKagueE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Meadows17,
  author       = {Catherine Meadows},
  title        = {Symbolic Security Criteria for Blockwise Adaptive Secure Modes of
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1152},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1152},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Meadows17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeiklejohnM17,
  author       = {Sarah Meiklejohn and
                  Rebekah Mercer},
  title        = {M{\"{o}}bius: Trustless Tumbling for Transaction Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {881},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/881},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeiklejohnM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MellaDA17,
  author       = {Silvia Mella and
                  Joan Daemen and
                  Gilles Van Assche},
  title        = {New techniques for trail bounds and application to differential trails
                  in Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MellaDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mennink17,
  author       = {Bart Mennink},
  title        = {Insuperability of the Standard Versus Ideal Model Gap for Tweakable
                  Blockcipher Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mennink17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenninkN17,
  author       = {Bart Mennink and
                  Samuel Neves},
  title        = {Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using
                  Mirror Theory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenninkN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenninkN17a,
  author       = {Bart Mennink and
                  Samuel Neves},
  title        = {Optimal PRFs from Blockcipher Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {812},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/812},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenninkN17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenninkS17,
  author       = {Bart Mennink and
                  Alan Szepieniec},
  title        = {{XOR} of PRPs in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenninkS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeshkovCJ17,
  author       = {Dmitry Meshkov and
                  Alexander Chepurnoy and
                  Marc Jansen},
  title        = {Revisiting Difficulty Control for Blockchain Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {731},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/731},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeshkovCJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MessmerRAM17,
  author       = {Sebastian Messmer and
                  Jochen Rill and
                  Dirk Achenbach and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  title        = {A Novel Cryptographic Framework for Cloud File Systems and CryFS,
                  a Provably-Secure Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {773},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/773},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MessmerRAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerRC17,
  author       = {Michael Meyer and
                  Steffen Reith and
                  Fabio Campos},
  title        = {On hybrid {SIDH} schemes using Edwards and Montgomery curve arithmetic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1213},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1213},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicciancioW17,
  author       = {Daniele Micciancio and
                  Michael Walter},
  title        = {Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicciancioW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MillerNV17,
  author       = {Stephen D. Miller and
                  Bhargav Narayanan and
                  Ramarathnam Venkatesan},
  title        = {Coppersmith's lattices and "focus groups": an attack on small-exponent
                  {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {835},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/835},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MillerNV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilnerCYR17,
  author       = {Kevin Milner and
                  Cas Cremers and
                  Jiangshan Yu and
                  Mark Ryan},
  title        = {Automatically Detecting the Misuse of Secrets: Foundations, Design
                  Principles, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilnerCYR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilutinovicHWK17,
  author       = {Mitar Milutinovic and
                  Warren He and
                  Howard Wu and
                  Maxinder Kanwal},
  title        = {Proof of Luck: an Efficient Blockchain Consensus Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilutinovicHWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuI17,
  author       = {Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Cryptanalysis of PMACx, PMAC2x, and SIVx},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinematsuI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MiracleY17,
  author       = {Sarah Miracle and
                  Scott Yilek},
  title        = {Cycle Slicer: An Algorithm for Building Permutations on Special Domains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/873},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MiracleY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MironovSS17,
  author       = {Ilya Mironov and
                  Gil Segev and
                  Ido Shahaf},
  title        = {Strengthening the Security of Encrypted Databases: Non-Transitive
                  JOINs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {883},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/883},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MironovSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MitrokotsaOPP17,
  author       = {Aikaterini Mitrokotsa and
                  Cristina Onete and
                  Elena Pagnin and
                  Mahesh Perera},
  title        = {Multi-Hop Distance Estimation: How Far are You?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/705},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MitrokotsaOPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoghimiIE17,
  author       = {Ahmad Moghimi and
                  Gorka Irazoqui and
                  Thomas Eisenbarth},
  title        = {CacheZoom: How {SGX} Amplifies The Power of Cache Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoghimiIE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohamedP17,
  author       = {Mohamed Saied Emam Mohamed and
                  Albrecht Petzoldt},
  title        = {Efficient Multivariate Ring Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohamedP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselR17,
  author       = {Payman Mohassel and
                  Mike Rosulek},
  title        = {Non-Interactive Secure 2PC in the Offline/Online and Batch Settings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselRS17,
  author       = {Payman Mohassel and
                  Mike Rosulek and
                  Alessandra Scafuro},
  title        = {Sublinear Zero-Knowledge Arguments for {RAM} Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselZ17,
  author       = {Payman Mohassel and
                  Yupeng Zhang},
  title        = {SecureML: {A} System for Scalable Privacy-Preserving Machine Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoodyPS17,
  author       = {Dustin Moody and
                  Ray A. Perlner and
                  Daniel Smith{-}Tone},
  title        = {Improved Attacks for Characteristic-2 Parameters of the Cubic {ABC}
                  Simple Matrix Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoodyPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoosM17,
  author       = {Thorben Moos and
                  Amir Moradi},
  title        = {On the Easiness of Turning Higher-Order Leakages into First-Order},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoosM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorganP17,
  author       = {Danielle Morgan and
                  Arnis Parsovs},
  title        = {Using the Estonian Electronic Identity Card for Authentication to
                  a Machine (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {880},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/880},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorganP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MouhaRKK17,
  author       = {Nicky Mouha and
                  Mohammad S. Raunak and
                  D. Richard Kuhn and
                  Raghu Kacker},
  title        = {Finding Bugs in Cryptographic Hash Function Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {891},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/891},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MouhaRKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MourisTM17,
  author       = {Dimitris Mouris and
                  Nektarios Georgios Tsoutsos and
                  Michail Maniatakos},
  title        = {TERMinator Suite: Benchmarking Privacy-Preserving Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1218},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MourisTM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Muehlemann17,
  author       = {Anton Muehlemann},
  title        = {Sentiment Protocol: {A} Decentralized Protocol Leveraging Crowd Sourced
                  Wisdom},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1133},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Muehlemann17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MurphyP17,
  author       = {Sean Murphy and
                  Rachel Player},
  title        = {Noise Distributions in Homomorphic Ring-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/698},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MurphyP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MusaX17,
  author       = {Saud Al Musa and
                  Guangwu Xu},
  title        = {Fast Scalar Multiplication for Elliptic Curves over Binary Fields
                  by Efficiently Computable Formulas},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/840},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MusaX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MyersS17,
  author       = {Steven A. Myers and
                  Adam Shull},
  title        = {Efficient Hybrid Proxy Re-Encryption for Practical Revocation and
                  Key Rotation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {833},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/833},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MyersS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NachefMV17,
  author       = {Val{\'{e}}rie Nachef and
                  Nicolas Marri{\`{e}}re and
                  Emmanuel Volte},
  title        = {Differential Attacks on {LILLIPUT} Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1121},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NachefMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naito17,
  author       = {Yusuke Naito},
  title        = {Tweakable Blockciphers for Efficient Authenticated Encryptions with
                  Beyond the Birthday-Bound Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naito17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi17,
  author       = {Mridul Nandi},
  title        = {Birthday Attack on Dual {EWCDM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nargis17,
  author       = {Isheeta Nargis},
  title        = {Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nargis17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NascimentoC17,
  author       = {Erick Nascimento and
                  Lukasz Chmielewski},
  title        = {Horizontal Clustering Side-Channel Attacks on Embedded {ECC} Implementations
                  (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1204},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NascimentoC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenSCM17,
  author       = {Phuong Ha Nguyen and
                  Durga Prasad Sahoo and
                  Rajat Subhra Chakraborty and
                  Debdeep Mukhopadhyay},
  title        = {Security Analysis of Arbiter {PUF} and Its Lightweight Compositions
                  Under Predictability Test},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenSCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenSJMD17,
  author       = {Phuong Ha Nguyen and
                  Durga Prasad Sahoo and
                  Chenglu Jin and
                  Kaleel Mahmood and
                  Marten van Dijk},
  title        = {{MXPUF:} Secure {PUF} Design against State-of-the-art Modeling Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenSJMD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenTW17,
  author       = {Khoa Nguyen and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  title        = {Zero-Knowledge Password Policy Check from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {854},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/854},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NiederhagenNY17,
  author       = {Ruben Niederhagen and
                  Kai{-}Chun Ning and
                  Bo{-}Yin Yang},
  title        = {Implementing Joux-Vitse's Crossbred Algorithm for Solving {MQ} Systems
                  over {GF(2)} on GPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1181},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NiederhagenNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nielsen17,
  author       = {Jesper Buus Nielsen},
  title        = {Universally Composable Zero-Knowledge Proof of Membership},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nielsen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikitinKJGGKCF17,
  author       = {Kirill Nikitin and
                  Eleftherios Kokoris{-}Kogias and
                  Philipp Jovanovic and
                  Linus Gasser and
                  Nicolas Gailly and
                  Ismail Khoffi and
                  Justin Cappos and
                  Bryan Ford},
  title        = {{CHAINIAC:} Proactive Software-Update Transparency via Collectively
                  Signed Skipchains and Verified Builds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/648},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikitinKJGGKCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nikolic17,
  author       = {Ivica Nikolic},
  title        = {How to Use Metaheuristics for Design of Symmetric-Key Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {851},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/851},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nikolic17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimuraNHMS17,
  author       = {Akihiro Nishimura and
                  Takuya Nishida and
                  Yu{-}ichi Hayashi and
                  Takaaki Mizuki and
                  Hideaki Sone},
  title        = {Card-Based Protocols Using Unequal Division Shuffle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimuraNHMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nojoumian17,
  author       = {Mehrdad Nojoumian},
  title        = {Rational Trust Modeling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nojoumian17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nyberg17,
  author       = {Kaisa Nyberg},
  title        = {Statistical and Linear Independence of Binary Random Variables},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nyberg17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ObremskiS17,
  author       = {Maciej Obremski and
                  Maciej Skorski},
  title        = {Inverted Leftover Hash Lemma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/507},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ObremskiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ObremskiS17a,
  author       = {Maciej Obremski and
                  Maciej Skorski},
  title        = {Renyi Entropy Estimation Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/588},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ObremskiS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OlafsdottirRC17,
  author       = {Hildur {\'{O}}lafsd{\'{o}}ttir and
                  Aanjhan Ranganathan and
                  Srdjan Capkun},
  title        = {On the Security of Carrier Phase-based Ranging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/591},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OlafsdottirRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OliveiraLR17,
  author       = {Thomaz Oliveira and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {A note on how to (pre-)compute a ladder},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/264},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OliveiraLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OliveiraLR17a,
  author       = {Thomaz Oliveira and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {The Montgomery ladder on binary elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/350},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OliveiraLR17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OlivierQ17,
  author       = {Baptiste Olivier and
                  Tony Quertier},
  title        = {Towards an in-depth understanding of privacy parameters for randomized
                  sanitization mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {882},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/882},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OlivierQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrhonH17,
  author       = {Neriman Gamze Orhon and
                  H{\"{u}}seyin Hisil},
  title        = {Speeding up Huff Form of Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrhonH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OuSWZ17,
  author       = {Changhai Ou and
                  Degang Sun and
                  Zhu Wang and
                  Xinping Zhou},
  title        = {Towards Optimal Pre-processing in Leakage Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {939},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/939},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/OuSWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OuSWZA17,
  author       = {Changhai Ou and
                  Degang Sun and
                  Zhu Wang and
                  Xinping Zhou and
                  Juan Ai},
  title        = {Towards Easy Key Enumeration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/254},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/OuSWZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OuSWZC17,
  author       = {Changhai Ou and
                  Degang Sun and
                  Zhu Wang and
                  Xinping Zhou and
                  Wei Cheng},
  title        = {Manifold Learning Towards Masking Implementations: {A} First Study},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1112},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1112},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/OuSWZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OuWSZ17,
  author       = {Changhai Ou and
                  Zhu Wang and
                  Degang Sun and
                  Xinping Zhou},
  title        = {Profiling Good Leakage Models For Masked Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/660},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/OuWSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzmenHY17,
  author       = {Muslum Ozgur Ozmen and
                  Thang Hoang and
                  Attila A. Yavuz},
  title        = {Forward-Private Dynamic Searchable Symmetric Encryption with Efficient
                  Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1222},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OzmenHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzmenY17,
  author       = {Muslum Ozgur Ozmen and
                  Attila A. Yavuz},
  title        = {Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small
                  Aerial Drones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1039},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OzmenY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PagninM17,
  author       = {Elena Pagnin and
                  Aikaterini Mitrokotsa},
  title        = {Privacy-preserving biometric authentication: challenges and directions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PagninM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PagninMT17,
  author       = {Elena Pagnin and
                  Aikaterini Mitrokotsa and
                  Keisuke Tanaka},
  title        = {Anonymous Single-Round Server-Aided Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PagninMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PakniatNE17,
  author       = {Nasrollah Pakniat and
                  Mahnaz Noroozi and
                  Ziba Eslami},
  title        = {Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based
                  on Cellular Automata},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PakniatNE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanethR17,
  author       = {Omer Paneth and
                  Guy N. Rothblum},
  title        = {On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive
                  Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {903},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/903},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanethR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapadopoulosWHN17,
  author       = {Dimitrios Papadopoulos and
                  Duane Wessels and
                  Shumon Huque and
                  Moni Naor and
                  Jan Vcel{\'{a}}k and
                  Leonid Reyzin and
                  Sharon Goldberg},
  title        = {Can {NSEC5} be practical for {DNSSEC} deployments?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/099},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PapadopoulosWHN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Papagiannopoulos17,
  author       = {Kostas Papagiannopoulos and
                  Nikita Veshchikov},
  title        = {Mind the Gap: Towards Secure 1st-order Masking in Software},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Papagiannopoulos17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParterY17,
  author       = {Merav Parter and
                  Eylon Yogev},
  title        = {Distributed Computing Made Secure: {A} New Cycle Cover Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1182},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParterY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paskin-Cherniavsky17,
  author       = {Anat Paskin{-}Cherniavsky and
                  Slava Radune},
  title        = {Coding for interactive communication beyond threshold adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {672},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/672},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paskin-Cherniavsky17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassS17,
  author       = {Rafael Pass and
                  Elaine Shi},
  title        = {Thunderella: Blockchains with Optimistic Instant Confirmation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {913},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/913},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatelPY17,
  author       = {Sarvar Patel and
                  Giuseppe Persiano and
                  Kevin Yeo},
  title        = {Recursive ORAMs with Practical Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {964},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/964},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatelPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatelPY17a,
  author       = {Sarvar Patel and
                  Giuseppe Persiano and
                  Kevin Yeo},
  title        = {Symmetric Searchable Encryption with Sharing and Unsharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {973},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/973},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatelPY17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisBMB17,
  author       = {Sikhar Patranabis and
                  Jakub Breier and
                  Debdeep Mukhopadhyay and
                  Shivam Bhasin},
  title        = {One Plus One is More than Two: {A} Practical Combination of Power
                  and Fault Analysis Attacks on {PRESENT} and PRESENT-like Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1073},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisBMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisM17a,
  author       = {Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  title        = {Encrypt-Augment-Recover: Computationally Function Private Predicate
                  Encryption in the Public-Key Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisM17b,
  author       = {Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  title        = {Spot the Black Hat in a Dark Room: Parallelized Controlled Access
                  Searchable Encryption on FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisM17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisM17c,
  author       = {Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  title        = {Lightweight Symmetric-Key Hidden Vector Encryption without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {796},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/796},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisM17c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulR17,
  author       = {Goutam Paul and
                  Souvik Ray},
  title        = {Analysis of Burn-in period for {RC4} State Transition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeetersHA17,
  author       = {Roel Peeters and
                  Jens Hermans and
                  Aysajan Abidin},
  title        = {Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeetersHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeikertRS17,
  author       = {Chris Peikert and
                  Oded Regev and
                  Noah Stephens{-}Davidowitz},
  title        = {Pseudorandomness of Ring-LWE for Any Ring and Modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeikertRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeikertS17,
  author       = {Chris Peikert and
                  Sina Shiehian},
  title        = {Privately Constraining and Programming PRFs, the {LWE} Way},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1094},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeikertS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Perez-SolaDNH17,
  author       = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Sergi Delgado{-}Segura and
                  Guillermo Navarro{-}Arribas and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Double-spending Prevention for Bitcoin zero-confirmation transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Perez-SolaDNH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PerilloC17,
  author       = {Angelo Massimo Perillo and
                  Emiliano De Cristofaro},
  title        = {{PAPEETE:} Private, Authorized, and Fast Personal Genomic Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {770},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/770},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PerilloC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PerrinPRR17,
  author       = {L{\'{e}}o Perrin and
                  Angela Promitzer and
                  Sebastian Ramacher and
                  Christian Rechberger},
  title        = {Improvements to the Linear Layer of LowMC: {A} Faster Picnic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1148},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PerrinPRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Persichetti17,
  author       = {Edoardo Persichetti},
  title        = {Efficient Digital Signatures From Coding Theory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Persichetti17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pessl17,
  author       = {Peter Pessl},
  title        = {Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pessl17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PesslBY17,
  author       = {Peter Pessl and
                  Leon Groot Bruinderink and
                  Yuval Yarom},
  title        = {To {BLISS-B} or not to be - Attacking strongSwan's Implementation
                  of Post-Quantum Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/490},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PesslBY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Petit17,
  author       = {Christophe Petit},
  title        = {Faster Algorithms for Isogeny Problems using Torsion Point Images},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Petit17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitL17,
  author       = {Christophe Petit and
                  Kristin E. Lauter},
  title        = {Hard and Easy Problems for Supersingular Isogeny Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {962},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/962},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Petzoldt17,
  author       = {Albrecht Petzoldt},
  title        = {On the Complexity of the Hybrid Approach on HFEv-},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1135},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Petzoldt17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetzoldtSM17,
  author       = {Albrecht Petzoldt and
                  Alan Szepieniec and
                  Mohamed Saied Emam Mohamed},
  title        = {A Practical Multivariate Blind Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PetzoldtSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanBPMB17,
  author       = {Quoc{-}Sang Phan and
                  Lucas Bang and
                  Corina S. Pasareanu and
                  Pasquale Malacaria and
                  Tevfik Bultan},
  title        = {Synthesis of Adaptive Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanBPMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhongAHWM17,
  author       = {Le Trieu Phong and
                  Yoshinori Aono and
                  Takuya Hayashi and
                  Lihua Wang and
                  Shiho Moriai},
  title        = {Privacy-Preserving Deep Learning via Additively Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {715},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/715},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhongAHWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHG17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Sylvain Guilley},
  title        = {Template Attack vs Bayes Classifier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHJBL17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Lejla Batina and
                  Axel Legay},
  title        = {The secrets of profiling for side-channel analysis: feature selection
                  matters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHJBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHJLK17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Axel Legay and
                  Karlo Knezevic},
  title        = {Profiled {SCA} with a New Twist: Semi-supervised Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1085},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHJLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinoL17,
  author       = {Rafa{\"{e}}l Del Pino and
                  Vadim Lyubashevsky},
  title        = {Amortization with Fewer Equations for Proving Knowledge of Small Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinoLNS17,
  author       = {Rafa{\"{e}}l del Pino and
                  Vadim Lyubashevsky and
                  Gregory Neven and
                  Gregor Seiler},
  title        = {Practical Quantum-Safe Voting from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1235},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinoLNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoddebniakSSLR17,
  author       = {Damian Poddebniak and
                  Juraj Somorovsky and
                  Sebastian Schinzel and
                  Manfred Lochter and
                  Paul R{\"{o}}sler},
  title        = {Attacking Deterministic Signature Schemes using Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1014},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoddebniakSSLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PointchevalS17,
  author       = {David Pointcheval and
                  Olivier Sanders},
  title        = {Reassessing Security of Randomizable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1197},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PointchevalS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PolyakovRSV17,
  author       = {Yuriy Polyakov and
                  Kurt Rohloff and
                  Gyana Sahu and
                  Vinod Vaikuntanathan},
  title        = {Fast Proxy Re-Encryption for Publish/Subscribe Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PolyakovRSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Portmann17,
  author       = {Christopher Portmann},
  title        = {Quantum Authentication with Key Recycling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Portmann17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PotthastFLL17,
  author       = {Martin Potthast and
                  Christian Forler and
                  Eik List and
                  Stefan Lucks},
  title        = {Passphone: Outsourcing Phone-based Web Authentication while Protecting
                  User Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/158},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PotthastFLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PouliotGW17,
  author       = {David Pouliot and
                  Scott Griffy and
                  Charles V. Wright},
  title        = {The Strength of Weak Randomization: Efficiently Searchable Encryption
                  with Minimal Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1098},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PouliotGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoussierZS17,
  author       = {Romain Poussier and
                  Yuanyuan Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {A Systematic Approach to the Side-Channel Analysis of {ECC} Implementations
                  with Worst-Case Horizontal Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/629},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoussierZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Prest17,
  author       = {Thomas Prest},
  title        = {Sharper Bounds in Lattice-Based Cryptography using the R{\'{e}}nyi
                  Divergence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Prest17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrimasPM17,
  author       = {Robert Primas and
                  Peter Pessl and
                  Stefan Mangard},
  title        = {Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {594},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/594},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PrimasPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PudduDC17,
  author       = {Ivan Puddu and
                  Alexandra Dmitrienko and
                  Srdjan Capkun},
  title        = {{\(\mu\)}chain: How to Forget without Hard Forks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PudduDC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QiLZQ17,
  author       = {Saiyu Qi and
                  Yichen Li and
                  Yuanqing Zheng and
                  Yong Qi},
  title        = {Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the
                  Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QiLZQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}