default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2017.bht:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/iacr/000117, author = {Lorenzo Grassi}, title = {Mixture Differential Cryptanalysis: New Approaches for Distinguishers and Attacks on round-reduced {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {832}, year = {2017}, url = {http://eprint.iacr.org/2017/832}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/000117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/000117a, author = {Yusuke Naito}, title = {Blockcipher-based MACs: Beyond the Birthday Bound without Message Length}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2017}, url = {http://eprint.iacr.org/2017/852}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/000117a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/000117b, author = {Lorenzo Grassi}, title = {MixColumns Properties and Attacks on (round-reduced) {AES} with a Single Secret S-Box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1200}, year = {2017}, url = {http://eprint.iacr.org/2017/1200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/000117b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001LPRS17, author = {Zhe Liu and Patrick Longa and Geovandro C. C. F. Pereira and Oscar Reparaz and Hwajeong Seo}, title = {FourQ on embedded devices with strong countermeasures against side-channel attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2017}, url = {http://eprint.iacr.org/2017/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001LPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001M17, author = {Sebastian Meiser and Esfandiar Mohammadi}, title = {Ratio Buckets: {A} Numeric Method for r-Fold Tight Differential Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1034}, year = {2017}, url = {http://eprint.iacr.org/2017/1034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001M17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001MW17, author = {Divya Gupta and Hemanta K. Maji and Mingyuan Wang}, title = {Constant-rate Non-malleable Codes in the Split-state Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1048}, year = {2017}, url = {http://eprint.iacr.org/2017/1048}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/0001MW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001W17, author = {Alexander Koch and Stefan Walzer}, title = {Foundations for Actively Secure Card-based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2017}, url = {http://eprint.iacr.org/2017/423}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/0001W17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001ZWGL17, author = {Yu Yu and Jiang Zhang and Jian Weng and Chun Guo and Xiangxue Li}, title = {Collision Resistant Hashing from Learning Parity with Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1260}, year = {2017}, url = {http://eprint.iacr.org/2017/1260}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/0001ZWGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0003FL17, author = {Xiaojuan Zhang and Xiutao Feng and Dongdai Lin}, title = {Fault Attack on {ACORN} v3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {855}, year = {2017}, url = {http://eprint.iacr.org/2017/855}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0003FL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0008MXL17, author = {Wei Yu and Saud Al Musa and Guangwu Xu and Bao Li}, title = {A Novel Pre-Computation Scheme of Window {\(\tau\)}NAF for Koblitz Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1020}, year = {2017}, url = {http://eprint.iacr.org/2017/1020}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0008MXL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0021G17, author = {Jie Chen and Junqing Gong}, title = {{ABE} with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {859}, year = {2017}, url = {http://eprint.iacr.org/2017/859}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0021G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AarajCM17, author = {Najwa Aaraj and Florian Caullery and Marc Manzano}, title = {MILP-aided Cryptanalysis of Round Reduced ChaCha}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1163}, year = {2017}, url = {http://eprint.iacr.org/2017/1163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AarajCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP17, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, title = {Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2017}, url = {http://eprint.iacr.org/2017/500}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP17a, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {On the Tightness of Forward-Secure Signature Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2017}, url = {http://eprint.iacr.org/2017/746}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCFGU17, author = {Michel Abdalla and Dario Catalano and Dario Fiore and Romain Gay and Bogdan Ursu}, title = {Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {972}, year = {2017}, url = {http://eprint.iacr.org/2017/972}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCFGU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemAG17, author = {Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann}, title = {Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2017}, url = {http://eprint.iacr.org/2017/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemAG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiBLZ17, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac}, title = {A Subversion-Resistant {SNARK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2017}, url = {http://eprint.iacr.org/2017/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiBLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeHNOP17, author = {Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan}, title = {Compact Structure-preserving Signatures with Almost Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2017}, url = {http://eprint.iacr.org/2017/524}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeHNOP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbrahamMN0S17, author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Alexander Spiegelman}, title = {Solida: {A} Blockchain Protocol Based on Reconfigurable Byzantine Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1118}, year = {2017}, url = {http://eprint.iacr.org/2017/1118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbrahamMN0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbusalahACKPR17, author = {Hamza Abusalah and Jo{\"{e}}l Alwen and Bram Cohen and Danylo Khilko and Krzysztof Pietrzak and Leonid Reyzin}, title = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {893}, year = {2017}, url = {http://eprint.iacr.org/2017/893}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbusalahACKPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AcharyaD17, author = {Kamalesh Acharya and Ratna Dutta}, title = {Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2017}, url = {http://eprint.iacr.org/2017/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AcharyaD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AcharyaD17a, author = {Kamalesh Acharya and Ratna Dutta}, title = {Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2017}, url = {http://eprint.iacr.org/2017/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AcharyaD17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdomnicaiFM17, author = {Alexandre Adomnicai and Jacques J. A. Fournier and Laurent Masson}, title = {Bricklayer Attack: {A} Side-Channel Analysis on the ChaCha Quarter Round}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2017}, url = {http://eprint.iacr.org/2017/1021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdomnicaiFM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AfsharMR17, author = {Arash Afshar and Payman Mohassel and Mike Rosulek}, title = {Efficient Maliciously Secure Two Party Computation for Mixed Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2017}, url = {http://eprint.iacr.org/2017/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AfsharMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDHS17, author = {Abhinav Aggarwal and Varsha Dani and Thomas P. Hayes and Jared Saia}, title = {Distributed Computing with Channel Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {710}, year = {2017}, url = {http://eprint.iacr.org/2017/710}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalJPS17, author = {Divesh Aggarwal and Antoine Joux and Anupam Prakash and Miklos Santha}, title = {A New Public-Key Cryptosystem via Mersenne Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2017}, url = {http://eprint.iacr.org/2017/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalJPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AghiliM17, author = {Seyed Farhad Aghili and Hamid Mala}, title = {Security Analysis of an Ultra-lightweight {RFID} Authentication Protocol for M-commerce}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2017}, url = {http://eprint.iacr.org/2017/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AghiliM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AghiliM17a, author = {Seyed Farhad Aghili and Hamid Mala}, title = {On the security of another {CRC} based ultralightweight {RFID} authentication protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1054}, year = {2017}, url = {http://eprint.iacr.org/2017/1054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AghiliM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Agievich17, author = {Sergey Agievich}, title = {{EHE:} nonce misuse-resistant message authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2017}, url = {http://eprint.iacr.org/2017/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Agievich17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBPSY17, author = {Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehl{\'{e}} and Shota Yamada}, title = {Efficient Public Trace and Revoke from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2017}, url = {http://eprint.iacr.org/2017/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBPSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalC17, author = {Shashank Agrawal and Melissa Chase}, title = {Simplifying Design and Analysis of Complex Predicate Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2017}, url = {http://eprint.iacr.org/2017/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalC17a, author = {Shashank Agrawal and Melissa Chase}, title = {{FAME:} Fast Attribute-based Message Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {807}, year = {2017}, url = {http://eprint.iacr.org/2017/807}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalC17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmetzyanovaAOS17, author = {Liliya R. Ahmetzyanova and Evgeny K. Alekseev and Igor B. Oshkin and Stanislav V. Smyshlyaev}, title = {Increasing the Lifetime of Symmetric Keys for the {GCM} Mode by Internal Re-keying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2017}, url = {http://eprint.iacr.org/2017/697}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmetzyanovaAOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkaviaLM17, author = {Adi Akavia and Rio LaVigne and Tal Moran}, title = {Topology-Hiding Computation on all Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2017}, url = {http://eprint.iacr.org/2017/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkaviaLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkaviaM17, author = {Adi Akavia and Tal Moran}, title = {Topology-Hiding Computation Beyond Logarithmic Diameter}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2017}, url = {http://eprint.iacr.org/2017/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkaviaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkiyamaGOTNHSI17, author = {Koichiro Akiyama and Yasuhiro Goto and Shinya Okumura and Tsuyoshi Takagi and Koji Nuida and Goichiro Hanaoka and Hideo Shimizu and Yasuhiko Ikematsu}, title = {A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1241}, year = {2017}, url = {http://eprint.iacr.org/2017/1241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkiyamaGOTNHSI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyEYG17, author = {Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong}, title = {Lelantos: {A} Blockchain-based Anonymous Physical Delivery System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2017}, url = {http://eprint.iacr.org/2017/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyEYG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyRHMYG17, author = {Riham AlTawy and Raghvendra Rohit and Morgan He and Kalikinkar Mandal and Gangqiang Yang and Guang Gong}, title = {sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2017}, url = {http://eprint.iacr.org/2017/747}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyRHMYG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlagicGM17, author = {Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz}, title = {Unforgeable Quantum Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {960}, year = {2017}, url = {http://eprint.iacr.org/2017/960}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlagicGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlagicM17, author = {Gorjan Alagic and Christian Majenz}, title = {Quantum non-malleability and authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2017}, url = {http://eprint.iacr.org/2017/533}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlagicM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlamBMB17, author = {Manaar Alam and Sarani Bhattacharya and Debdeep Mukhopadhyay and Sourangshu Bhattacharya}, title = {Performance Counters to Rescue: {A} Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {564}, year = {2017}, url = {http://eprint.iacr.org/2017/564}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlamBMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlamatiPS17, author = {Navid Alamati and Chris Peikert and Noah Stephens{-}Davidowitz}, title = {New (and Old) Proof Systems for Lattice Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1226}, year = {2017}, url = {http://eprint.iacr.org/2017/1226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlamatiPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Albrecht17, author = {Martin R. Albrecht}, title = {On dual lattice attacks against small-secret {LWE} and parameter choices in HElib and {SEAL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2017}, url = {http://eprint.iacr.org/2017/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Albrecht17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtD17, author = {Martin R. Albrecht and Amit Deo}, title = {Large Modulus Ring-LWE {\textgreater}= Module-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {612}, year = {2017}, url = {http://eprint.iacr.org/2017/612}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtDLP17, author = {Martin R. Albrecht and Alex Davidson and Enrique Larraia and Alice Pellet{-}Mary}, title = {Notes On {GGH13} Without The Presence Of Ideals}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {906}, year = {2017}, url = {http://eprint.iacr.org/2017/906}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtDLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtGVW17, author = {Martin R. Albrecht and Florian G{\"{o}}pfert and Fernando Virdia and Thomas Wunderer}, title = {Revisiting the Expected Cost of Solving uSVP and Applications to {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {815}, year = {2017}, url = {http://eprint.iacr.org/2017/815}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtGVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtOPPS17, author = {Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart}, title = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2017}, url = {http://eprint.iacr.org/2017/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtOPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AldermanMR17, author = {James Alderman and Keith M. Martin and Sarah Louise Renwick}, title = {Multi-level Access in Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2017}, url = {http://eprint.iacr.org/2017/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AldermanMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlexopoulosKTZ17, author = {Nikolaos Alexopoulos and Aggelos Kiayias and Riivo Talviste and Thomas Zacharias}, title = {MCMix: Anonymous Messaging via Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {778}, year = {2017}, url = {http://eprint.iacr.org/2017/778}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlexopoulosKTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlkadriBBK17, author = {Nabil Alkeilani Alkadri and Johannes Buchmann and Rachid El Bansarkhani and Juliane Kr{\"{a}}mer}, title = {A Framework to Select Parameters for Lattice-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2017}, url = {http://eprint.iacr.org/2017/615}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlkadriBBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlmeidaBBDGLP17, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Fran{\c{c}}ois Dupressoir and Benjamin Gr{\'{e}}goire and Vincent Laporte and Vitor Pereira}, title = {A Fast and Verified Software Stack for Secure Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {821}, year = {2017}, url = {http://eprint.iacr.org/2017/821}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlmeidaBBDGLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Alperin-Sheriff17, author = {Jacob Alperin{-}Sheriff and Jintai Ding and Albrecht Petzoldt and Daniel Smith{-}Tone}, title = {Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2017}, url = {http://eprint.iacr.org/2017/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Alperin-Sheriff17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Alperin-Sheriff17a, author = {Jacob Alperin{-}Sheriff and Daniel Apon}, title = {Weak is Better: Tightly Secure Short Signatures from Weak PRFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2017}, url = {http://eprint.iacr.org/2017/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Alperin-Sheriff17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenBH17, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Benjamin Harsha}, title = {Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2017}, url = {http://eprint.iacr.org/2017/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenT17, author = {Jo{\"{e}}l Alwen and Bj{\"{o}}rn Tackmann}, title = {Moderately Hard Functions: Definition, Instantiations, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {945}, year = {2017}, url = {http://eprint.iacr.org/2017/945}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlyC17, author = {Abdelrahaman Aly and Sara Cleemput}, title = {An Improved Protocol for Securely Solving the Shortest Path Problem and its Application to Combinatorial Auctions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {971}, year = {2017}, url = {http://eprint.iacr.org/2017/971}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlyC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlyV17, author = {Abdelrahaman Aly and Mathieu Van Vyve}, title = {Practically Efficient Secure Single-Commodity Multi-Market Auctions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2017}, url = {http://eprint.iacr.org/2017/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlyV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmadoriPS17, author = {Alessandro Amadori and Federico Pintore and Massimiliano Sala}, title = {On the discrete logarithm problem for prime-field elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2017}, url = {http://eprint.iacr.org/2017/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmadoriPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbronaBGW17, author = {Miguel Ambrona and Gilles Barthe and Romain Gay and Hoeteck Wee}, title = {Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {983}, year = {2017}, url = {http://eprint.iacr.org/2017/983}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbronaBGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbroseBFJLM17, author = {Christopher Ambrose and Joppe W. Bos and Bj{\"{o}}rn Fay and Marc Joye and Manfred Lochter and Bruce Murray}, title = {Differential Attacks on Deterministic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {975}, year = {2017}, url = {http://eprint.iacr.org/2017/975}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbroseBFJLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnadaA17, author = {Hiroaki Anada and Seiko Arita}, title = {Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2017}, url = {http://eprint.iacr.org/2017/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnadaA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ananth017, author = {Prabhanjan Ananth and Abhishek Jain}, title = {On Secure Two-Party Computation in Three Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2017}, url = {http://eprint.iacr.org/2017/942}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ananth017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthCJ17, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Abhishek Jain}, title = {A New Approach to Round-Optimal Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2017}, url = {http://eprint.iacr.org/2017/402}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJS17, author = {Prabhanjan Ananth and Aayush Jain and Amit Sahai}, title = {Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2017}, url = {http://eprint.iacr.org/2017/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AngelCLS17, author = {Sebastian Angel and Hao Chen and Kim Laine and Srinath T. V. Setty}, title = {{PIR} with compressed queries and amortized query processing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1142}, year = {2017}, url = {http://eprint.iacr.org/2017/1142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AngelCLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleS17, author = {Robin Ankele and Andrew Simpson}, title = {Privacy Games for Syntactic Privacy Notions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1126}, year = {2017}, url = {http://eprint.iacr.org/2017/1126}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Anokhin17, author = {Mikhail Anokhin}, title = {A Certain Family of Subgroups of {\textdollar}{\textbackslash}mathbb Z{\_}n{\textbackslash}star{\textdollar} Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1131}, year = {2017}, url = {http://eprint.iacr.org/2017/1131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Anokhin17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnshelAGG17, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells}, title = {WalnutDSA(TM): {A} Quantum Resistant Group Theoretic Digital Signature Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2017}, url = {http://eprint.iacr.org/2017/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnshelAGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnshelAGG17a, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells}, title = {Kayawood, a Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1162}, year = {2017}, url = {http://eprint.iacr.org/2017/1162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnshelAGG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoN17, author = {Yoshinori Aono and Phong Q. Nguyen}, title = {Random Sampling Revisited: Lattice Enumeration with Discrete Pruning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2017}, url = {http://eprint.iacr.org/2017/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AonoN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AponCEK17, author = {Daniel Apon and Chongwon Cho and Karim Eldefrawy and Jonathan Katz}, title = {Efficient, Reusable Fuzzy Extractors from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {755}, year = {2017}, url = {http://eprint.iacr.org/2017/755}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AponCEK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AponFL17, author = {Daniel Apon and Xiong Fan and Feng{-}Hao Liu}, title = {Vector Encoding over Lattices and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2017}, url = {http://eprint.iacr.org/2017/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AponFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Applebaum17, author = {Benny Applebaum}, title = {Garbled Circuits as Randomized Encodings of Functions: a Primer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2017}, url = {http://eprint.iacr.org/2017/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Applebaum17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumARV17, author = {Benny Applebaum and Barak Arkis and Pavel Raykov and Prashant Nalini Vasudevan}, title = {Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2017}, url = {http://eprint.iacr.org/2017/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumARV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumDINZ17, author = {Benny Applebaum and Ivan Damg{\aa}rd and Yuval Ishai and Michael Nielsen and Lior Zichron}, title = {Secure Arithmetic Computation with Constant Computational Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2017}, url = {http://eprint.iacr.org/2017/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumDINZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumHIKV17, author = {Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan}, title = {Low-Complexity Cryptographic Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2017}, url = {http://eprint.iacr.org/2017/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumHIKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AritaH17, author = {Seiko Arita and Sari Handa}, title = {Subring Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2017}, url = {http://eprint.iacr.org/2017/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AritaH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBKL17, author = {Frederik Armknecht and Jens{-}Matthias Bohli and Ghassan O. Karame and Wenting Li}, title = {Sharding PoW-based Blockchains via Proofs of Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1067}, year = {2017}, url = {http://eprint.iacr.org/2017/1067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasBPNR17, author = {Victor Arribas and Beg{\"{u}}l Bilgin and George Petrides and Svetla Nikova and Vincent Rijmen}, title = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1193}, year = {2017}, url = {http://eprint.iacr.org/2017/1193}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasBPNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasNR17, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {VerMI: Verification Tool for Masked Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1227}, year = {2017}, url = {http://eprint.iacr.org/2017/1227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovCNPRS17, author = {Gilad Asharov and T.{-}H. Hubert Chan and Kartik Nayak and Rafael Pass and Ling Ren and Elaine Shi}, title = {Oblivious Computation with Data Locality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2017}, url = {http://eprint.iacr.org/2017/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovCNPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovDS0SSZ17, author = {Gilad Asharov and Daniel Demmler and Michael Schapira and Thomas Schneider and Gil Segev and Scott Shenker and Michael Zohner}, title = {Privacy-Preserving Interdomain Routing at Internet Scale}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2017}, url = {http://eprint.iacr.org/2017/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovDS0SSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovHLR17, author = {Gilad Asharov and Shai Halevi and Yehuda Lindell and Tal Rabin}, title = {Privacy-Preserving Search of Similar Patients in Genomic Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2017}, url = {http://eprint.iacr.org/2017/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovHLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurBD17, author = {Tomer Ashur and Dani{\"{e}}l Bodden and Orr Dunkelman}, title = {Linear Cryptanalysis Using Low-bias Linear Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2017}, url = {http://eprint.iacr.org/2017/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurBD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurDL17, author = {Tomer Ashur and Orr Dunkelman and Atul Luykx}, title = {Boosting Authenticated Encryption Robustness With Minimal Modifications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2017}, url = {http://eprint.iacr.org/2017/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Attrapadung17, author = {Nuttapong Attrapadung}, title = {Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) {ABE} for Unbounded-Size Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2017}, url = {http://eprint.iacr.org/2017/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Attrapadung17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtzeiBLZ17, author = {Nicola Atzei and Massimo Bartoletti and Stefano Lande and Roberto Zunino}, title = {A formal model of Bitcoin transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1124}, year = {2017}, url = {http://eprint.iacr.org/2017/1124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtzeiBLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuerbachCFK17, author = {Benedikt Auerbach and David Cash and Manuel Fersch and Eike Kiltz}, title = {Memory-Tight Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2017}, url = {http://eprint.iacr.org/2017/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuerbachCFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonE17, author = {Jean{-}Philippe Aumasson and Guillaume Endignoux}, title = {Clarifying the subset-resilience problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {909}, year = {2017}, url = {http://eprint.iacr.org/2017/909}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonE17a, author = {Jean{-}Philippe Aumasson and Guillaume Endignoux}, title = {Improving Stateless Hash-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {933}, year = {2017}, url = {http://eprint.iacr.org/2017/933}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonE17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvoineBGGLOR17, author = {Gildas Avoine and Xavier Bultel and S{\'{e}}bastien Gambs and David G{\'{e}}rault and Pascal Lafourcade and Cristina Onete and Jean{-}Marc Robert}, title = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2017}, url = {http://eprint.iacr.org/2017/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvoineBGGLOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaanBGRTTZ17, author = {Hayo Baan and Sauvik Bhattacharya and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Ronald Rietman and Ludo Tolhuizen and Jose Luis Torre{-}Arce and Zhenfei Zhang}, title = {Round2: {KEM} and {PKE} based on {GLWR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1183}, year = {2017}, url = {http://eprint.iacr.org/2017/1183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaanBGRTTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Badertscher0M17, author = {Christian Badertscher and Christian Matt and Ueli Maurer}, title = {Strengthening Access Control Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2017}, url = {http://eprint.iacr.org/2017/429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Badertscher0M17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherM17, author = {Christian Badertscher and Ueli Maurer}, title = {Composable and Robust Outsourced Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2017}, url = {http://eprint.iacr.org/2017/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherMTZ17, author = {Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {Bitcoin as a Transaction Ledger: {A} Composable Treatment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2017}, url = {http://eprint.iacr.org/2017/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherMTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17, author = {Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai}, title = {A note on VRFs from Verifiable Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2017}, url = {http://eprint.iacr.org/2017/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17a, author = {Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia}, title = {Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2017}, url = {http://eprint.iacr.org/2017/433}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17b, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Dakshita Khurana and Amit Sahai}, title = {Round Optimal Concurrent {MPC} via Strong Simulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2017}, url = {http://eprint.iacr.org/2017/597}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17c, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Promise Zero Knowledge and its Applications to Round Optimal {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2017}, url = {http://eprint.iacr.org/2017/1088}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK17, author = {Saikrishna Badrinarayanan and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2017}, url = {http://eprint.iacr.org/2017/1250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BajardEHMSZ17, author = {Jean{-}Claude Bajard and Julien Eynard and M. Anwar Hasan and Paulo Martins and Leonel Sousa and Vincent Zucca}, title = {Efficient reductions in cyclotomic rings - Application to {R-LWE} based {FHE} schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2017}, url = {http://eprint.iacr.org/2017/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BajardEHMSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschFGPS17, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Consolidating Inner Product Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1047}, year = {2017}, url = {http://eprint.iacr.org/2017/1047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschFGPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiCDLRSY17, author = {Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov}, title = {Accumulators with Applications to Anonymity-Preserving Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2017}, url = {http://eprint.iacr.org/2017/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiCDLRSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiKS17, author = {Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari}, title = {Watermarking Public-key Cryptographic Functionalities and Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2017}, url = {http://eprint.iacr.org/2017/557}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKM17, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, title = {Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1061}, year = {2017}, url = {http://eprint.iacr.org/2017/1061}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallRSV17, author = {Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan}, title = {Average-Case Fine-Grained Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2017}, url = {http://eprint.iacr.org/2017/202}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallRSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallRSV17a, author = {Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan}, title = {Proofs of Useful Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2017}, url = {http://eprint.iacr.org/2017/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BallRSV17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaloghES17, author = {Marko Balogh and Edward Eaton and Fang Song}, title = {Quantum Collision-Finding in Non-Uniform Random Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {688}, year = {2017}, url = {http://eprint.iacr.org/2017/688}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaloghES17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalticoCFG17, author = {Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay}, title = {Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2017}, url = {http://eprint.iacr.org/2017/151}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalticoCFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanegasB17, author = {Gustavo Banegas and Daniel J. Bernstein}, title = {Low-communication parallel quantum multi-target preimage search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {789}, year = {2017}, url = {http://eprint.iacr.org/2017/789}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanegasB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanegasBBCDGGHK17, author = {Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre{-}Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thiecoumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane Ndiaye and Duc Tri Nguyen and Edoardo Persichetti and Jefferson E. Ricardini}, title = {{DAGS:} Key Encapsulation using Dyadic {GS} Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1037}, year = {2017}, url = {http://eprint.iacr.org/2017/1037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanegasBBCDGGHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikBIJ17, author = {Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Martin Bjerregaard Jepsen}, title = {Analysis of Software Countermeasures for Whitebox Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2017}, url = {http://eprint.iacr.org/2017/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikBIJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikI17, author = {Subhadeep Banik and Takanori Isobe}, title = {Some cryptanalytic results on Lizard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2017}, url = {http://eprint.iacr.org/2017/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikPPSTS17, author = {Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Siang Meng Sim and Yosuke Todo and Yu Sasaki}, title = {{GIFT:} {A} Small Present}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2017}, url = {http://eprint.iacr.org/2017/622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikPPSTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BansarkhaniK17, author = {Rachid El Bansarkhani and Ali {El Kaafarani}}, title = {Direct Anonymous Attestation from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1022}, year = {2017}, url = {http://eprint.iacr.org/2017/1022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BansarkhaniK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoW0G17, author = {Zhenzhen Bao and Lei Wang and Jian Guo and Dawu Gu}, title = {Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2017}, url = {http://eprint.iacr.org/2017/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoW0G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Barak17, author = {Boaz Barak}, title = {The Complexity of Public-Key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2017}, url = {http://eprint.iacr.org/2017/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Barak17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakBKK17, author = {Boaz Barak and Zvika Brakerski and Ilan Komargodski and Pravesh K. Kothari}, title = {Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2017}, url = {http://eprint.iacr.org/2017/312}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakBKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaCF17, author = {Manuel Barbosa and Dario Catalano and Dario Fiore}, title = {Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2017}, url = {http://eprint.iacr.org/2017/326}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbulescuD17, author = {Razvan Barbulescu and Sylvain Duquesne}, title = {Updating key size estimations for pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2017}, url = {http://eprint.iacr.org/2017/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbulescuD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarnettSSSSVW17, author = {Anthony Barnett and Jay Santokhi and Michael Simpson and Nigel P. Smart and Charlie Stainton{-}Bygrave and Srinivas Vivek and Adrian Waller}, title = {Image Classification using non-linear Support Vector Machines on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {857}, year = {2017}, url = {http://eprint.iacr.org/2017/857}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BarnettSSSSVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoDDMN17, author = {Paulo S. L. M. Barreto and Bernardo David and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento}, title = {A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the {ROM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {993}, year = {2017}, url = {http://eprint.iacr.org/2017/993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoDDMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoGGMPST17, author = {Paulo S. L. M. Barreto and Shay Gueron and Tim G{\"{u}}neysu and Rafael Misoczki and Edoardo Persichetti and Nicolas Sendrier and Jean{-}Pierre Tillich}, title = {{CAKE:} Code-based Algorithm for Key Encapsulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {757}, year = {2017}, url = {http://eprint.iacr.org/2017/757}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoGGMPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheDG17, author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and Benjamin Gr{\'{e}}goire}, title = {A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1053}, year = {2017}, url = {http://eprint.iacr.org/2017/1053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheDG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheGL17, author = {Gilles Barthe and Benjamin Gr{\'{e}}goire and Vincent Laporte}, title = {Provably secure compilation of side-channel countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1233}, year = {2017}, url = {http://eprint.iacr.org/2017/1233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartolettiLP17, author = {Massimo Bartoletti and Stefano Lande and Alessandro Sebastian Podda}, title = {A Proof-of-Stake protocol for consensus on Bitcoin subchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2017}, url = {http://eprint.iacr.org/2017/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartolettiLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarwellMOS17, author = {Guy Barwell and Daniel P. Martin and Elisabeth Oswald and Martijn Stam}, title = {Authenticated Encryption in the Face of Protocol and Side Channel Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2017}, url = {http://eprint.iacr.org/2017/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarwellMOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BasinLS17, author = {David A. Basin and Andreas Lochbihler and S. Reza Sefidgar}, title = {CryptHOL: Game-based Proofs in Higher-order Logic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2017}, url = {http://eprint.iacr.org/2017/753}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BasinLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BattenY17, author = {Lynn Batten and Xun Yi}, title = {Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1220}, year = {2017}, url = {http://eprint.iacr.org/2017/1220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BattenY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BauchBVLV17, author = {Jens Bauch and Daniel J. Bernstein and Henry de Valence and Tanja Lange and Christine van Vredendaal}, title = {Short generators without quantum computers: the case of multiquadratics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2017}, url = {http://eprint.iacr.org/2017/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BauchBVLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumL17, author = {Carsten Baum and Vadim Lyubashevsky}, title = {Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {759}, year = {2017}, url = {http://eprint.iacr.org/2017/759}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeaulieuSSTWW17, author = {Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman{-}Clark and Bryan Weeks and Louis Wingers}, title = {Notes on the design and analysis of {SIMON} and {SPECK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2017}, url = {http://eprint.iacr.org/2017/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeaulieuSSTWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BecerraIOS17, author = {Jos{\'{e}} Becerra and Vincenzo Iovino and Dimiter Ostrev and Marjan Skrobot}, title = {On the Relation Between {SIM} and IND-RoR Security Models for PAKEs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2017}, url = {http://eprint.iacr.org/2017/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BecerraIOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BecerraIOSS17, author = {Jos{\'{e}} Becerra and Vincenzo Iovino and Dimiter Ostrev and Petra Sala and Marjan Skrobot}, title = {Tightly-Secure {PAK(E)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1045}, year = {2017}, url = {http://eprint.iacr.org/2017/1045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BecerraIOSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BecerraSS17, author = {Jos{\'{e}} Becerra and Petra Sala and Marjan Skrobot}, title = {An Offline Dictionary Attack against zkPAKE Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {961}, year = {2017}, url = {http://eprint.iacr.org/2017/961}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BecerraSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckCDKPSS17, author = {Michael Till Beck and Jan Camenisch and David Derler and Stephan Krenn and Henrich C. P{\"{o}}hls and Kai Samelin and Daniel Slamanig}, title = {Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2017}, url = {http://eprint.iacr.org/2017/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckCDKPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Becker17, author = {Georg T. Becker}, title = {Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {493}, year = {2017}, url = {http://eprint.iacr.org/2017/493}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Becker17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerK17, author = {Anja Becker and Dusan Kostic}, title = {Speeding up lattice sieve with Xeon Phi coprocessor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2017}, url = {http://eprint.iacr.org/2017/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BehniaOY17, author = {Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz}, title = {Lattice-Based Public Key Encryption with Keyword Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1215}, year = {2017}, url = {http://eprint.iacr.org/2017/1215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BehniaOY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeierleCLR17, author = {Christof Beierle and Anne Canteaut and Gregor Leander and Yann Rotella}, title = {Proving Resistance against Invariant Attacks: How to Choose the Round Constants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2017}, url = {http://eprint.iacr.org/2017/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeierleCLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelFMP17, author = {Amos Beimel and Oriol Farr{\`{a}}s and Yuval Mintz and Naty Peter}, title = {Linear Secret-Sharing Schemes for Forbidden Graph Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {940}, year = {2017}, url = {http://eprint.iacr.org/2017/940}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelFMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelIK17, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz}, title = {Ad Hoc {PSM} Protocols: Secure Computation Without Coordination}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2017}, url = {http://eprint.iacr.org/2017/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelIK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareH17, author = {Mihir Bellare and Viet Tung Hoang}, title = {Identity-Based Format-Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {877}, year = {2017}, url = {http://eprint.iacr.org/2017/877}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareOS17, author = {Mihir Bellare and Adam O'Neill and Igors Stepanovs}, title = {Forward-Security under Continual Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2017}, url = {http://eprint.iacr.org/2017/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-DavidS17, author = {Shalev Ben{-}David and Or Sattath}, title = {Quantum Tokens for Digital Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2017}, url = {http://eprint.iacr.org/2017/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-DavidS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-Efraim17, author = {Aner Ben{-}Efraim}, title = {On Multiparty Garbling of Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1186}, year = {2017}, url = {http://eprint.iacr.org/2017/1186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-Efraim17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-EfraimLO17, author = {Aner Ben{-}Efraim and Yehuda Lindell and Eran Omri}, title = {Efficient Scalable Constant-Round {MPC} via Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {862}, year = {2017}, url = {http://eprint.iacr.org/2017/862}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-EfraimLO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenarrochBL17, author = {Daniel Benarroch and Zvika Brakerski and Tancr{\`{e}}de Lepoint}, title = {{FHE} Over the Integers: Decomposed and Batched in the Post-Quantum Regime}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2017}, url = {http://eprint.iacr.org/2017/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenarrochBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenedettiTF17, author = {L{\'{e}}onard Benedetti and Aur{\'{e}}lien Thierry and Julien Francq}, title = {Detection of cryptographic algorithms with grap}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1119}, year = {2017}, url = {http://eprint.iacr.org/2017/1119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenedettiTF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaBDQ17, author = {Fabrice Benhamouda and Olivier Blazy and L{\'{e}}o Ducas and Willy Quach}, title = {Hash Proof Systems over Lattices Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {997}, year = {2017}, url = {http://eprint.iacr.org/2017/997}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaBDQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaBL17, author = {Fabrice Benhamouda and Florian Bourse and Helger Lipmaa}, title = {CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2017}, url = {http://eprint.iacr.org/2017/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaFGN17, author = {Fabrice Benhamouda and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Non-Interactive Provably Secure Attestations for Arbitrary {RSA} Prime Generation Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2017}, url = {http://eprint.iacr.org/2017/640}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaFGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaKR17, author = {Fabrice Benhamouda and Hugo Krawczyk and Tal Rabin}, title = {Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2017}, url = {http://eprint.iacr.org/2017/555}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaL17, author = {Fabrice Benhamouda and Huijia Lin}, title = {k-Round {MPC} from k-Round {OT} via Garbled Interactive Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1125}, year = {2017}, url = {http://eprint.iacr.org/2017/1125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BentovHMN17, author = {Iddo Bentov and Pavel Hub{\'{a}}cek and Tal Moran and Asaf Nadler}, title = {Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2017}, url = {http://eprint.iacr.org/2017/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BentovHMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BentovJZLZBDJ17, author = {Iddo Bentov and Yan Ji and Fan Zhang and Yunqi Li and Xueyuan Zhao and Lorenz Breidenbach and Philip Daian and Ari Juels}, title = {Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1153}, year = {2017}, url = {http://eprint.iacr.org/2017/1153}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BentovJZLZBDJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BentovKM17, author = {Iddo Bentov and Ranjit Kumaresan and Andrew Miller}, title = {Instantaneous Decentralized Poker}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {875}, year = {2017}, url = {http://eprint.iacr.org/2017/875}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BentovKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BerendJB17, author = {David Berend and Bernhard Jungk and Shivam Bhasin}, title = {There Goes Your {PIN:} Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1169}, year = {2017}, url = {http://eprint.iacr.org/2017/1169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BerendJB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BermanDRV17, author = {Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan}, title = {Multi Collision Resistant Hash Functions and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2017}, url = {http://eprint.iacr.org/2017/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BermanDRV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BermanRV17, author = {Itay Berman and Ron D. Rothblum and Vinod Vaikuntanathan}, title = {Zero-Knowledge Proofs of Proximity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2017}, url = {http://eprint.iacr.org/2017/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BermanRV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Berners-Lee17, author = {Ela Lee}, title = {Improved Security Notions for Proxy Re-Encryption to Enforce Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {824}, year = {2017}, url = {http://eprint.iacr.org/2017/824}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Berners-Lee17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinB0P17, author = {Daniel J. Bernstein and Leon Groot Bruinderink and Tanja Lange and Lorenz Panny}, title = {{HILA5} Pindakaas: On the {CCA} security of lattice-based encryption with error correction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1214}, year = {2017}, url = {http://eprint.iacr.org/2017/1214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinB0P17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBGBHLV17, author = {Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom}, title = {Sliding right into disaster: Left-to-right sliding windows leak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2017}, url = {http://eprint.iacr.org/2017/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBGBHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBM17, author = {Daniel J. Bernstein and Jean{-}Fran{\c{c}}ois Biasse and Michele Mosca}, title = {A low-resource quantum factoring algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2017}, url = {http://eprint.iacr.org/2017/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCL17, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange}, title = {Double-base scalar multiplication revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2017}, url = {http://eprint.iacr.org/2017/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinHLV17, author = {Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta}, title = {Post-quantum {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2017}, url = {http://eprint.iacr.org/2017/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinKLMMNS17, author = {Daniel J. Bernstein and Stefan K{\"{o}}lbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and Fran{\c{c}}ois{-}Xavier Standaert and Yosuke Todo and Beno{\^{\i}}t Viguier}, title = {Gimli: a cross-platform permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2017}, url = {http://eprint.iacr.org/2017/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinKLMMNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL17, author = {Daniel J. Bernstein and Tanja Lange}, title = {Montgomery curves and the Montgomery ladder}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2017}, url = {http://eprint.iacr.org/2017/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL17a, author = {Daniel J. Bernstein and Tanja Lange}, title = {Post-quantum cryptography - dealing with the fallout of physics success}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2017}, url = {http://eprint.iacr.org/2017/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinY17, author = {Daniel J. Bernstein and Bo{-}Yin Yang}, title = {Asymptotically faster quantum algorithms to solve multivariate quadratic equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1206}, year = {2017}, url = {http://eprint.iacr.org/2017/1206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BessonovGS17, author = {Mariya Bessonov and Dima Grigoriev and Vladimir Shpilrain}, title = {Probabilistic solution of Yao's millionaires' problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1129}, year = {2017}, url = {http://eprint.iacr.org/2017/1129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BessonovGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeullensP17, author = {Ward Beullens and Bart Preneel}, title = {Field lifting for smaller {UOV} public keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2017}, url = {http://eprint.iacr.org/2017/776}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeullensP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeunardeauCGN17, author = {Marc Beunardeau and Aisling Connolly and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {On the Hardness of the Mersenne Low Hamming Ratio Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2017}, url = {http://eprint.iacr.org/2017/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeunardeauCGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeunardeauFGN17, author = {Marc Beunardeau and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Honey Encryption for Language}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2017}, url = {http://eprint.iacr.org/2017/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeunardeauFGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhandariC17, author = {Anindya Shankar Bhandari and Dipanwita Roy Chowdhury}, title = {{ZETA:} Towards Tagless Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2017}, url = {http://eprint.iacr.org/2017/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhandariC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacharyaGRT17, author = {Sauvik Bhattacharya and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Ronald Rietman and Ludo Tolhuizen}, title = {spKEX: An optimized lattice-based key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {709}, year = {2017}, url = {http://eprint.iacr.org/2017/709}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacharyaGRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacharyaMBM17, author = {Sarani Bhattacharya and Cl{\'{e}}mentine Maurice and Shivam Bhasin and Debdeep Mukhopadhyay}, title = {Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {968}, year = {2017}, url = {http://eprint.iacr.org/2017/968}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacharyaMBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacherjeeS17, author = {Sanjay Bhattacherjee and Palash Sarkar}, title = {Cryptocurrency Voting Games}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1167}, year = {2017}, url = {http://eprint.iacr.org/2017/1167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacherjeeS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikDDMN17, author = {Ritam Bhaumik and Nilanjan Datta and Avijit Dutta and Nicky Mouha and Mridul Nandi}, title = {The Iterated Random Function Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {892}, year = {2017}, url = {http://eprint.iacr.org/2017/892}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikDDMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikN17, author = {Ritam Bhaumik and Mridul Nandi}, title = {Improved Security for {OCB3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2017}, url = {http://eprint.iacr.org/2017/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiLDLW17, author = {Wenquan Bi and Zheng Li and Xiaoyang Dong and Lu Li and Xiaoyun Wang}, title = {Conditional Cube Attack on Round-Reduced River Keyak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2017}, url = {http://eprint.iacr.org/2017/1012}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiLDLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiancoG17, author = {Giulia Bianco and Elisa Gorla}, title = {Scalar multiplication in compressed coordinates in the trace-zero subgroup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {884}, year = {2017}, url = {http://eprint.iacr.org/2017/884}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiancoG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiancoG17a, author = {Giulia Bianco and Elisa Gorla}, title = {Compression for trace zero points on twisted Edwards curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {886}, year = {2017}, url = {http://eprint.iacr.org/2017/886}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiancoG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiasseEFGK17, author = {Jean{-}Fran{\c{c}}ois Biasse and Thomas Espitau and Pierre{-}Alain Fouque and Alexandre G{\'{e}}lin and Paul Kirchner}, title = {Computing generator in cyclotomic integer rings, {A} subfield algorithm for the Principal Ideal Problem in {L(1/2)} and application to cryptanalysis of a {FHE} scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2017}, url = {http://eprint.iacr.org/2017/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiasseEFGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BicerBKL17, author = {Osman Bi{\c{c}}er and Muhammed Ali Bing{\"{o}}l and Mehmet Sabir Kiraz and Albert Levi}, title = {Towards Practical {PFE:} An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2017}, url = {http://eprint.iacr.org/2017/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BicerBKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindelBKMSW17, author = {Nina Bindel and Johannes Buchmann and Juliane Kr{\"{a}}mer and Heiko Mantel and Johannes Schickel and Alexandra Weber}, title = {Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {951}, year = {2017}, url = {http://eprint.iacr.org/2017/951}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BindelBKMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindelHMS17, author = {Nina Bindel and Udyani Herath and Matthew McKague and Douglas Stebila}, title = {Transitioning to a Quantum-Resistant Public Key Infrastructure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2017}, url = {http://eprint.iacr.org/2017/460}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BindelHMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindschaedlerGC17, author = {Vincent Bindschaedler and Paul Grubbs and David Cash and Thomas Ristenpart and Vitaly Shmatikov}, title = {The Tao of Inference in Privacy-Protected Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1078}, year = {2017}, url = {http://eprint.iacr.org/2017/1078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BindschaedlerGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovFK17, author = {Alex Biryukov and Daniel Feher and Dmitry Khovratovich}, title = {Guru: Universal Reputation Module for Distributed Consensus Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2017}, url = {http://eprint.iacr.org/2017/671}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovP17, author = {Alex Biryukov and L{\'{e}}o Perrin}, title = {Symmetrically and Asymmetrically Hard Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2017}, url = {http://eprint.iacr.org/2017/414}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovP17a, author = {Alex Biryukov and L{\'{e}}o Perrin}, title = {State of the Art in Lightweight Symmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2017}, url = {http://eprint.iacr.org/2017/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovUV17, author = {Alex Biryukov and Aleksei Udovenko and Vesselin Velichkov}, title = {Analysis of the {NORX} Core Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2017}, url = {http://eprint.iacr.org/2017/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovUV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bitansky17, author = {Nir Bitansky}, title = {Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2017}, url = {http://eprint.iacr.org/2017/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bitansky17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyKP17, author = {Nir Bitansky and Yael Tauman Kalai and Omer Paneth}, title = {Multi-Collision Resistance: {A} Paradigm for Keyless Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2017}, url = {http://eprint.iacr.org/2017/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackthorneKFY17, author = {Jeremy Blackthorne and Benjamin Kaiser and Benjamin Fuller and B{\"{u}}lent Yener}, title = {Environmental Authentication in Malware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {928}, year = {2017}, url = {http://eprint.iacr.org/2017/928}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackthorneKFY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassK17, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Strain: {A} Secure Auction for Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1044}, year = {2017}, url = {http://eprint.iacr.org/2017/1044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassN17, author = {Erik{-}Oliver Blass and Guevara Noubir}, title = {Secure Logging with Crash Tolerance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2017}, url = {http://eprint.iacr.org/2017/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyCG17, author = {Olivier Blazy and C{\'{e}}line Chevalier and Paul Germouty}, title = {Almost Optimal Oblivious Transfer from {QA-NIZK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2017}, url = {http://eprint.iacr.org/2017/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockiZ17, author = {Jeremiah Blocki and Samson Zhou}, title = {On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2017}, url = {http://eprint.iacr.org/2017/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockiZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BloemGIKMW17, author = {Roderick Bloem and Hannes Gro{\ss} and Rinat Iusupov and Bettina K{\"{o}}nighofer and Stefan Mangard and Johannes Winter}, title = {Formal Verification of Masked Hardware Implementations in the Presence of Glitches}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {897}, year = {2017}, url = {http://eprint.iacr.org/2017/897}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BloemGIKMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlomerL17, author = {Johannes Bl{\"{o}}mer and Gennadij Liske}, title = {Subtleties in Security Definitions for Predicate Encryption with Public Index}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2017}, url = {http://eprint.iacr.org/2017/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlomerL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauCS17, author = {C{\'{e}}line Blondeau and Roberto Civino and Massimiliano Sala}, title = {Differential Attacks: Using Alternative Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2017}, url = {http://eprint.iacr.org/2017/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BockSY17, author = {Hanno B{\"{o}}ck and Juraj Somorovsky and Craig Young}, title = {Return Of Bleichenbacher's Oracle Threat {(ROBOT)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1189}, year = {2017}, url = {http://eprint.iacr.org/2017/1189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BockSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoerDJW17, author = {Koen de Boer and L{\'{e}}o Ducas and Stacey Jeffery and Ronald de Wolf}, title = {Attacks on the {AJPS} Mersenne-based cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1171}, year = {2017}, url = {http://eprint.iacr.org/2017/1171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoerDJW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovR17, author = {Andrej Bogdanov and Alon Rosen}, title = {Pseudorandom Functions: Three Decades Later}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2017}, url = {http://eprint.iacr.org/2017/652}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovV17, author = {Andrey Bogdanov and Philip S. Vejre}, title = {Linear Cryptanalysis of {DES} with Asymmetries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {895}, year = {2017}, url = {http://eprint.iacr.org/2017/895}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaCDP17, author = {Alexandra Boldyreva and Shan Chen and Pierre{-}Alain Dupont and David Pointcheval}, title = {Human Computing for Handling Strong Corruptions in Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2017}, url = {http://eprint.iacr.org/2017/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaCDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaPS17, author = {Alexandra Boldyreva and Christopher Patton and Thomas Shrimpton}, title = {Hedging Public-Key Encryption in the Real World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {510}, year = {2017}, url = {http://eprint.iacr.org/2017/510}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonawitzIKMMPRS17, author = {Kallista A. Bonawitz and Vladimir Ivanov and Ben Kreuter and Antonio Marcedone and H. Brendan McMahan and Sarvar Patel and Daniel Ramage and Aaron Segal and Karn Seth}, title = {Practical Secure Aggregation for Privacy Preserving Machine Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2017}, url = {http://eprint.iacr.org/2017/281}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonawitzIKMMPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGGJKRS17, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2017}, url = {http://eprint.iacr.org/2017/956}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGGJKRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGGK17, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim}, title = {A Lattice-Based Universal Thresholdizer for Cryptographic Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2017}, url = {http://eprint.iacr.org/2017/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehISW17, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2017}, url = {http://eprint.iacr.org/2017/240}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehISW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehKM17, author = {Dan Boneh and Sam Kim and Hart William Montgomery}, title = {Private Puncturable PRFs From Standard Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2017}, url = {http://eprint.iacr.org/2017/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehKW17, author = {Dan Boneh and Sam Kim and David J. Wu}, title = {Constrained Keys for Invertible Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2017}, url = {http://eprint.iacr.org/2017/477}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bonnetain17, author = {Xavier Bonnetain}, title = {Quantum Key-Recovery on full {AEZ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {767}, year = {2017}, url = {http://eprint.iacr.org/2017/767}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bonnetain17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnoronDF17, author = {Guillaume Bonnoron and L{\'{e}}o Ducas and Max Fillinger}, title = {Large {FHE} gates from Tensored Homomorphic Accumulator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2017}, url = {http://eprint.iacr.org/2017/996}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnoronDF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonteBBCIV17, author = {Charlotte Bonte and Carl Bootland and Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Faster Homomorphic Function Evaluation using Non-Integral Base Encoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2017}, url = {http://eprint.iacr.org/2017/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonteBBCIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonteMASMV17, author = {Charlotte Bonte and Eleftheria Makri and Amin Ardeshirdavani and Jaak Simm and Yves Moreau and Frederik Vercauteren}, title = {Privacy-Preserving Genome-Wide Association Study is Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {955}, year = {2017}, url = {http://eprint.iacr.org/2017/955}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonteMASMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleCGGHJ17, author = {Jonathan Bootle and Andrea Cerulli and Essam Ghadafi and Jens Groth and Mohammad Hajiabadi and Sune K. Jakobsen}, title = {Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2017}, url = {http://eprint.iacr.org/2017/872}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootleCGGHJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleT17, author = {Jonathan Bootle and Mehdi Tibouchi}, title = {Cryptanalysis of Compact-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {742}, year = {2017}, url = {http://eprint.iacr.org/2017/742}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootleT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorgesPFP17, author = {Mateus Borges and Quoc{-}Sang Phan and Antonio Filieri and Corina S. Pasareanu}, title = {Model-counting Approaches For Nonlinear Numerical Constraints}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2017}, url = {http://eprint.iacr.org/2017/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorgesPFP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorissovBT17, author = {Yuri L. Borissov and Peter G. Boyvalenkov and Robert Tsenkov}, title = {On a Linear Cryptanalysis of a Family of Modified {DES} Ciphers with Even Weight S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2017}, url = {http://eprint.iacr.org/2017/089}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorissovBT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosDKLLSSS17, author = {Joppe W. Bos and L{\'{e}}o Ducas and Eike Kiltz and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehl{\'{e}}}, title = {{CRYSTALS} - Kyber: a CCA-secure module-lattice-based {KEM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2017}, url = {http://eprint.iacr.org/2017/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosDKLLSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosHMMGT17, author = {Joppe W. Bos and Charles Hubain and Wil Michiels and Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe Teuwen}, title = {White-Box Cryptography: Don't Forget About Grey Box Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2017}, url = {http://eprint.iacr.org/2017/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosHMMGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosM17, author = {Joppe W. Bos and Peter L. Montgomery}, title = {Montgomery Arithmetic from a Software Perspective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2017}, url = {http://eprint.iacr.org/2017/1057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoschiniCN17, author = {Cecilia Boschini and Jan Camenisch and Gregory Neven}, title = {Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1123}, year = {2017}, url = {http://eprint.iacr.org/2017/1123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoschiniCN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BostF17, author = {Raphael Bost and Pierre{-}Alain Fouque}, title = {Thwarting Leakage Abuse Attacks against Searchable Encryption - {A} Formal Approach and Applications to Database Padding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1060}, year = {2017}, url = {http://eprint.iacr.org/2017/1060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BostF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BostMO17, author = {Raphael Bost and Brice Minaud and Olga Ohrimenko}, title = {Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {805}, year = {2017}, url = {http://eprint.iacr.org/2017/805}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BostMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Both017, author = {Leif Both and Alexander May}, title = {Decoding Linear Codes with High Error Rate and its Impact for {LPN} Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1139}, year = {2017}, url = {http://eprint.iacr.org/2017/1139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Both017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BothM17, author = {Leif Both and Alexander May}, title = {The Approximate k-List Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2017}, url = {http://eprint.iacr.org/2017/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BothM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoudabraN17, author = {Maher Boudabra and Abderrahmane Nitaj}, title = {A New Generalization of the {KMOV} Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1077}, year = {2017}, url = {http://eprint.iacr.org/2017/1077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoudabraN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boudot17, author = {Fabrice Boudot}, title = {On Improving Integer Factorization and Discrete Logarithm Computation using Partial Triangulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {758}, year = {2017}, url = {http://eprint.iacr.org/2017/758}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boudot17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraCGJPP17, author = {Christina Boura and Ilaria Chillotti and Nicolas Gama and Dimitar Jetchev and Stanislav Peceny and Alexander Petric}, title = {High-Precision Privacy-Preserving Real-Valued Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1234}, year = {2017}, url = {http://eprint.iacr.org/2017/1234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraCGJPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoureanuG0O17, author = {Ioana Boureanu and David G{\'{e}}rault and Pascal Lafourcade and Cristina Onete}, title = {Breaking and Fixing the {HB+DB} protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2017}, url = {http://eprint.iacr.org/2017/416}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoureanuG0O17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BourseMMP17, author = {Florian Bourse and Michele Minelli and Matthias Minihold and Pascal Paillier}, title = {Fast Homomorphic Evaluation of Deep Discretized Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1114}, year = {2017}, url = {http://eprint.iacr.org/2017/1114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BourseMMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoweGG17, author = {Sean Bowe and Ariel Gabizon and Matthew D. Green}, title = {A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2017}, url = {http://eprint.iacr.org/2017/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoweGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoweGM17, author = {Sean Bowe and Ariel Gabizon and Ian Miers}, title = {Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1050}, year = {2017}, url = {http://eprint.iacr.org/2017/1050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoweGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydBCH17, author = {Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines}, title = {Key Recovery: Inert and Public}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2017}, url = {http://eprint.iacr.org/2017/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydBCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydDGTR17, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani and H{\aa}vard Raddum}, title = {Security notions for cloud storage and deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1208}, year = {2017}, url = {http://eprint.iacr.org/2017/1208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydDGTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydH17, author = {Colin Boyd and Britta Hale}, title = {Secure Channels and Termination: The Last Word on {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {784}, year = {2017}, url = {http://eprint.iacr.org/2017/784}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenL17, author = {Xavier Boyen and Qinyi Li}, title = {All-But-Many Lossy Trapdoor Functions from Lattices and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2017}, url = {http://eprint.iacr.org/2017/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGI17, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2017}, url = {http://eprint.iacr.org/2017/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGILT17, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Huijia Lin and Stefano Tessaro}, title = {Foundations of Homomorphic Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1248}, year = {2017}, url = {http://eprint.iacr.org/2017/1248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGILT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleIPW17, author = {Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters}, title = {Can We Access a Database Both Locally and Privately?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2017}, url = {http://eprint.iacr.org/2017/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleIPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleKRS17, author = {Elette Boyle and Saleet Klein and Alon Rosen and Gil Segev}, title = {Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2017}, url = {http://eprint.iacr.org/2017/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleKRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiHP17, author = {Zvika Brakerski and Shai Halevi and Antigoni Polychroniadou}, title = {Four Round Secure Computation without Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2017}, url = {http://eprint.iacr.org/2017/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiHP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiJKPW17, author = {Zvika Brakerski and Aayush Jain and Ilan Komargodski and Alain Passel{\`{e}}gue and Daniel Wichs}, title = {Non-Trivial Witness Encryption and Null-iO from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {874}, year = {2017}, url = {http://eprint.iacr.org/2017/874}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiJKPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiKP17, author = {Zvika Brakerski and Yael Tauman Kalai and Renen Perlman}, title = {Succinct Spooky Free Compilers Are Not Black Box Sound}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2017}, url = {http://eprint.iacr.org/2017/887}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiLSV17, author = {Zvika Brakerski and Alex Lombardi and Gil Segev and Vinod Vaikuntanathan}, title = {Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {967}, year = {2017}, url = {http://eprint.iacr.org/2017/967}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiLSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiTVW17, author = {Zvika Brakerski and Rotem Tsabary and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Private Constrained PRFs (and More) from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {795}, year = {2017}, url = {http://eprint.iacr.org/2017/795}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiTVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BranniganSOVOGR17, author = {S{\'{e}}amus Brannigan and Neil Smyth and Tobias Oder and Felipe Valencia and Elizabeth O'Sullivan and Tim G{\"{u}}neysu and Francesco Regazzoni}, title = {An Investigation of Sources of Randomness Within Discrete Gaussian Sampling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2017}, url = {http://eprint.iacr.org/2017/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BranniganSOVOGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreidenbachDTJ17, author = {Lorenz Breidenbach and Philip Daian and Florian Tram{\`{e}}r and Ari Juels}, title = {Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1090}, year = {2017}, url = {http://eprint.iacr.org/2017/1090}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreidenbachDTJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreierH17, author = {Jakub Breier and Xiaolu Hou}, title = {Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {829}, year = {2017}, url = {http://eprint.iacr.org/2017/829}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreierH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreierJB17, author = {Jakub Breier and Dirmanto Jap and Shivam Bhasin}, title = {{SCADPA:} Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1166}, year = {2017}, url = {http://eprint.iacr.org/2017/1166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreierJB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelD17, author = {Jacqueline Brendel and Denise Demirel}, title = {Efficient Proactive Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2017}, url = {http://eprint.iacr.org/2017/719}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelF0J17, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther and Christian Janson}, title = {{PRF-ODH:} Relations, Instantiations, and Impossibility Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2017}, url = {http://eprint.iacr.org/2017/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelF0J17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelF17, author = {Jacqueline Brendel and Marc Fischlin}, title = {Zero Round-Trip Time for the Extended Access Control Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2017}, url = {http://eprint.iacr.org/2017/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelFG17, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther}, title = {Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and {TLS} 1.3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1252}, year = {2017}, url = {http://eprint.iacr.org/2017/1252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Breuer17, author = {Peter T. Breuer}, title = {An Obfuscating Compiler}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2017}, url = {http://eprint.iacr.org/2017/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Breuer17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierGN17, author = {Eric Brier and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Exploring Naccache-Stern Knapsack Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2017}, url = {http://eprint.iacr.org/2017/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadnaxFMR17, author = {Brandon Broadnax and Valerie Fetzer and J{\"{o}}rn M{\"{u}}ller{-}Quade and Andy Rupp}, title = {Non-Malleability vs. CCA-Security: The Case of Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1069}, year = {2017}, url = {http://eprint.iacr.org/2017/1069}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BroadnaxFMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaJ17, author = {Chris Brzuska and H{\aa}kon Jacobsen}, title = {A Modular Security Analysis of {EAP} and {IEEE} 802.11}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2017}, url = {http://eprint.iacr.org/2017/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannBGKKMSV17, author = {Johannes Buchmann and Niklas B{\"{u}}scher and Florian G{\"{o}}pfert and Stefan Katzenbeisser and Juliane Kr{\"{a}}mer and Daniele Micciancio and Sander Siim and Christine van Vredendaal and Michael Walter}, title = {Creating Cryptographic Challenges Using Multi-Party Computation: The {LWE} Challenge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2017}, url = {http://eprint.iacr.org/2017/606}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannBGKKMSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannDSS17, author = {Johannes Buchmann and Denise Demirel and Lucas Schabh{\"{u}}ser and Patrick Struck}, title = {Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {700}, year = {2017}, url = {http://eprint.iacr.org/2017/700}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannDSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudroniP17, author = {Alessandro Budroni and Federico Pintore}, title = {Efficient hash maps to {\unicode{54590}}\({}_{\mbox{2}}\) on {BLS} curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2017}, url = {http://eprint.iacr.org/2017/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudroniP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuldasGB17, author = {Ahto Buldas and Matthias Geihs and Johannes Buchmann}, title = {Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2017}, url = {http://eprint.iacr.org/2017/754}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuldasGB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BultelDGGGL17, author = {Xavier Bultel and Manik Lal Das and Hardik Gajera and David G{\'{e}}rault and Matthieu Giraud and Pascal Lafourcade}, title = {Verifiable Private Polynomial Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2017}, url = {http://eprint.iacr.org/2017/756}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BultelDGGGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BultelL17, author = {Xavier Bultel and Pascal Lafourcade}, title = {Zero-Knowledge Proxy Re-Identification Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2017}, url = {http://eprint.iacr.org/2017/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BultelL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BultelL17a, author = {Xavier Bultel and Pascal Lafourcade}, title = {Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2017}, url = {http://eprint.iacr.org/2017/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BultelL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BunderNST17, author = {Martin W. Bunder and Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, title = {A generalized attack on {RSA} type cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1076}, year = {2017}, url = {http://eprint.iacr.org/2017/1076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BunderNST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BunzBBPWM17, author = {Benedikt B{\"{u}}nz and Jonathan Bootle and Dan Boneh and Andrew Poelstra and Pieter Wuille and Gregory Maxwell}, title = {Bulletproofs: Short Proofs for Confidential Transactions and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1066}, year = {2017}, url = {http://eprint.iacr.org/2017/1066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BunzBBPWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BurnsMRSV17, author = {Jonathan Burns and Daniel Moore and Katrina Ray and Ryan Speers and Brian Vohaska}, title = {{EC-OPRF:} Oblivious Pseudorandom Functions using Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2017}, url = {http://eprint.iacr.org/2017/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BurnsMRSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ByaliPRS17, author = {Megha Byali and Arpita Patra and Divya Ravi and Pratik Sarkar}, title = {Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1165}, year = {2017}, url = {http://eprint.iacr.org/2017/1165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ByaliPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CVGM17, author = {Ashokkumar C. and M. Bhargav Sri Venkatesh and Ravi Prakash Giri and Bernard Menezes}, title = {Design, Implementation and Performance Analysis of Highly Efficient Algorithms for {AES} Key Retrieval in Access-driven Cache-based Side Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {896}, year = {2017}, url = {http://eprint.iacr.org/2017/896}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CVGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CachinCFL17, author = {Christian Cachin and Jan Camenisch and Eduarda Freire{-}Stoegbuchner and Anja Lehmann}, title = {Updatable Tokenization: Formal Definitions and Provably Secure Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2017}, url = {http://eprint.iacr.org/2017/695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CachinCFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CachinCMTV17, author = {Christian Cachin and Angelo De Caro and Pedro Moreno{-}Sanchez and Bj{\"{o}}rn Tackmann and Marko Vukolic}, title = {The Transaction Graph for Modeling Blockchain Semantics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1070}, year = {2017}, url = {http://eprint.iacr.org/2017/1070}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CachinCMTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CachinGPT17, author = {Christian Cachin and Esha Ghosh and Dimitrios Papadopoulos and Bj{\"{o}}rn Tackmann}, title = {Stateful Multi-Client Verifiable Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {901}, year = {2017}, url = {http://eprint.iacr.org/2017/901}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CachinGPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CagliDP17, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures - Profiling Attacks without Pre-Processing -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2017}, url = {http://eprint.iacr.org/2017/740}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CagliDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamachoK17, author = {Philippe Camacho and Fernando Krell}, title = {Asynchronous provably-secure hidden services}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {888}, year = {2017}, url = {http://eprint.iacr.org/2017/888}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamachoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischCDLNU17, author = {Jan Camenisch and Liqun Chen and Manu Drijvers and Anja Lehmann and David Novick and Rainer Urian}, title = {One {TPM} to Bind Them All: Fixing {TPM} 2.0 for Provably Secure Anonymous Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2017}, url = {http://eprint.iacr.org/2017/639}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischCDLNU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischDKPSS17, author = {Jan Camenisch and David Derler and Stephan Krenn and Henrich C. P{\"{o}}hls and Kai Samelin and Daniel Slamanig}, title = {Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2017}, url = {http://eprint.iacr.org/2017/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischDKPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischDL17, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann}, title = {Anonymous Attestation with Subverted TPMs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2017}, url = {http://eprint.iacr.org/2017/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischL17, author = {Jan Camenisch and Anja Lehmann}, title = {Privacy for Distributed Databases via (Un)linkable Pseudonyms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2017}, url = {http://eprint.iacr.org/2017/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaminataG17, author = {Alessio Caminata and Elisa Gorla}, title = {Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {593}, year = {2017}, url = {http://eprint.iacr.org/2017/593}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaminataG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CampanelliGGN17, author = {Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo}, title = {Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2017}, url = {http://eprint.iacr.org/2017/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CampanelliGGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardCKS17, author = {S{\'{e}}bastien Canard and Sergiu Carpov and Donald Nokam Kuate and Renaud Sirdey}, title = {Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of {RLE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2017}, url = {http://eprint.iacr.org/2017/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardCKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiC17, author = {Ran Canetti and Yilei Chen}, title = {Constraint-hiding Constrained PRFs for {NC1} from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2017}, url = {http://eprint.iacr.org/2017/143}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiHMV17, author = {Ran Canetti and Kyle Hogan and Aanchal Malhotra and Mayank Varia}, title = {A Universally Composable Treatment of Network Time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1256}, year = {2017}, url = {http://eprint.iacr.org/2017/1256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiHMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiHR17, author = {Ran Canetti and Justin Holmgren and Silas Richelson}, title = {Towards Doubly Efficient Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2017}, url = {http://eprint.iacr.org/2017/568}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiL17, author = {Ran Canetti and Amit Lichtenberg}, title = {Certifying Trapdoor Permutations, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2017}, url = {http://eprint.iacr.org/2017/631}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautLNRSS17, author = {Anne Canteaut and Eran Lambooij and Samuel Neves and Shahram Rasoolzadeh and Yu Sasaki and Marc Stevens}, title = {Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2017}, url = {http://eprint.iacr.org/2017/478}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CanteautLNRSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet17, author = {Claude Carlet}, title = {Characterizations of the differential uniformity of vectorial functions by the Walsh transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {516}, year = {2017}, url = {http://eprint.iacr.org/2017/516}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet17a, author = {Claude Carlet}, title = {Componentwise APNness, Walsh uniformity of {APN} functions and cyclic-additive difference sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2017}, url = {http://eprint.iacr.org/2017/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletMR17, author = {Claude Carlet and Pierrick M{\'{e}}aux and Yann Rotella}, title = {Boolean functions with restricted input and their robustness; application to the {FLIP} cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2017}, url = {http://eprint.iacr.org/2017/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletP17, author = {Claude Carlet and Stjepan Picek}, title = {On the exponents of {APN} power functions and Sidon sets, sum-free sets, and Dickson polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1179}, year = {2017}, url = {http://eprint.iacr.org/2017/1179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarmerM017, author = {Brent Carmer and Alex J. Malozemoff and Mariana Raykova}, title = {5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {826}, year = {2017}, url = {http://eprint.iacr.org/2017/826}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarmerM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarmonSW17, author = {Elad Carmon and Jean{-}Pierre Seifert and Avishai Wool}, title = {Photonic Side Channel Attacks Against {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2017}, url = {http://eprint.iacr.org/2017/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarmonSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarpentRT17, author = {Xavier Carpent and Norrathep Rattanavipanon and Gene Tsudik}, title = {Probabilistic and Considerate Attestation of IoT Devices against Roving Malware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1216}, year = {2017}, url = {http://eprint.iacr.org/2017/1216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarpentRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarpovAS17, author = {Sergiu Carpov and Pascal Aubry and Renaud Sirdey}, title = {A multi-start heuristic for multiplicative depth minimization of boolean circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2017}, url = {http://eprint.iacr.org/2017/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarpovAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CartorS17, author = {Ryann Cartor and Daniel Smith{-}Tone}, title = {{EFLASH:} {A} New Multivariate Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1184}, year = {2017}, url = {http://eprint.iacr.org/2017/1184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CartorS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoD17, author = {Ignacio Cascudo and Bernardo David}, title = {{SCRAPE:} Scalable Randomness Attested by Public Entities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2017}, url = {http://eprint.iacr.org/2017/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDFR17, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Oriol Farr{\`{a}}s and Samuel Ranellucci}, title = {Resource-efficient {OT} combiners with active security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2017}, url = {http://eprint.iacr.org/2017/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDFR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashZ17, author = {David Cash and Cong Zhang}, title = {A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1120}, year = {2017}, url = {http://eprint.iacr.org/2017/1120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastagnosIL17, author = {Guilhem Castagnos and Laurent Imbert and Fabien Laguillaumie}, title = {Encryption Switching Protocols Revisited: Switching modulo p}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2017}, url = {http://eprint.iacr.org/2017/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastagnosIL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Castro17, author = {Alexandre de Castro}, title = {Quantum one-way permutation over the finite field of two elements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2017}, url = {http://eprint.iacr.org/2017/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Castro17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Castro17a, author = {Alexandre de Castro}, title = {Controlled-NOT function can provoke biased interpretation from Bell's test experiments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2017}, url = {http://eprint.iacr.org/2017/681}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Castro17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastryckIV17, author = {Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Homomorphic SIM\({}^{\mbox{2}}\)D Operations: Single Instruction Much More Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1013}, year = {2017}, url = {http://eprint.iacr.org/2017/1013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastryckIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CathebrasCSV17, author = {Jo{\"{e}}l Cath{\'{e}}bras and Alexandre Carbon and Renaud Sirdey and Nicolas Ventroux}, title = {An Analysis of {FV} Parameters Impact Towards its Hardware Acceleration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2017}, url = {http://eprint.iacr.org/2017/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CathebrasCSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CauchoisGL17, author = {Victor Cauchois and Cl{\'{e}}ment Gomez and Reynald Lercier}, title = {Generalized Distinguishing Attack: {A} New Cryptanalysis of AES-like Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2017}, url = {http://eprint.iacr.org/2017/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CauchoisGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cavanaugh17, author = {Steven Cavanaugh}, title = {A General Degenerate Grouping Power Attack with Specific Application to {SIMON} and {SPECK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2017}, url = {http://eprint.iacr.org/2017/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cavanaugh17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CecchettiZJKJS17, author = {Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed E. Kosba and Ari Juels and Elaine Shi}, title = {Solidus: Confidential Distributed Ledger Transactions via {PVORM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2017}, url = {http://eprint.iacr.org/2017/317}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CecchettiZJKJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CetinCLLRX17, author = {Gizem S. {\c{C}}etin and Hao Chen and Kim Laine and Kristin E. Lauter and Peter Rindal and Yuhou Xia}, title = {Private Queries on Encrypted Genomic Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2017}, url = {http://eprint.iacr.org/2017/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CetinCLLRX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChMV17, author = {Srikanth Ch and C. E. Veni Madhavan and Kumar Swamy H. V.}, title = {Family of PRGs based on Collections of Arithmetic Progressions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2017}, url = {http://eprint.iacr.org/2017/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChabanneKM17, author = {Herv{\'{e}} Chabanne and Julien Keuffer and Refik Molva}, title = {Embedded Proofs for Verifiable Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1038}, year = {2017}, url = {http://eprint.iacr.org/2017/1038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChabanneKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChabanneMP17, author = {Herv{\'{e}} Chabanne and Houssem Maghrebi and Emmanuel Prouff}, title = {Linear Repairing Codes and Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {918}, year = {2017}, url = {http://eprint.iacr.org/2017/918}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChabanneMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChabanneWMMP17, author = {Herv{\'{e}} Chabanne and Amaury de Wargny and Jonathan Milgram and Constance Morel and Emmanuel Prouff}, title = {Privacy-Preserving Classification on Deep Neural Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2017}, url = {http://eprint.iacr.org/2017/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChabanneWMMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaidosC17, author = {Pyrros Chaidos and Geoffroy Couteau}, title = {Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1029}, year = {2017}, url = {http://eprint.iacr.org/2017/1029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaidosC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaillouxD17, author = {Andr{\'{e}} Chailloux and Thomas Debris{-}Alazard}, title = {A tight security reduction in the quantum random oracle model for code-based signature schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {936}, year = {2017}, url = {http://eprint.iacr.org/2017/936}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaillouxD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaillouxNS17, author = {Andr{\'{e}} Chailloux and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {847}, year = {2017}, url = {http://eprint.iacr.org/2017/847}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaillouxNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortiIMN17, author = {Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi}, title = {Blockcipher-based Authenticated Encryption: How Small Can We Go?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2017}, url = {http://eprint.iacr.org/2017/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortiIMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyAR17, author = {Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan}, title = {New Approach to Practical Leakage-Resilient Public-Key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2017}, url = {http://eprint.iacr.org/2017/441}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyGMS17, author = {Debrup Chakraborty and Sebati Ghosh and Cuauhtemoc Mancillas L{\'{o}}pez and Palash Sarkar}, title = {{FAST:} Disk Encryption and Beyond}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {849}, year = {2017}, url = {http://eprint.iacr.org/2017/849}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyGMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyGS17, author = {Debrup Chakraborty and Sebati Ghosh and Palash Sarkar}, title = {Evaluating Bernstein-Rabin-Winograd Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2017}, url = {http://eprint.iacr.org/2017/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyMS17, author = {Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava}, title = {Correlation Power Analysis Attack against {STT-MRAM} Based Cyptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2017}, url = {http://eprint.iacr.org/2017/413}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyPR17, author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan}, title = {Efficient Compilers for After-the-Fact Leakage: from {CPA} to {CCA-2} secure {PKE} to {AKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2017}, url = {http://eprint.iacr.org/2017/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyRMR17, author = {Suvradip Chakraborty and Chester Rebeiro and Debdeep Mukhopadhyay and C. Pandu Rangan}, title = {Leakage-Resilient Tweakable Encryption from One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2017}, url = {http://eprint.iacr.org/2017/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyRMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanCMS17, author = {T.{-}H. Hubert Chan and Kai{-}Min Chung and Bruce M. Maggs and Elaine Shi}, title = {Foundations of Differentially Oblivious Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1033}, year = {2017}, url = {http://eprint.iacr.org/2017/1033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanCMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanCS17, author = {T.{-}H. Hubert Chan and Kai{-}Min Chung and Elaine Shi}, title = {On the Depth of Oblivious Parallel {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {861}, year = {2017}, url = {http://eprint.iacr.org/2017/861}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanGLS17, author = {T.{-}H. Hubert Chan and Yue Guo and Wei{-}Kai Lin and Elaine Shi}, title = {Cache-Oblivious and Data-Oblivious Sorting and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2017}, url = {http://eprint.iacr.org/2017/914}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanGLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanGLS17a, author = {T.{-}H. Hubert Chan and Yue Guo and Wei{-}Kai Lin and Elaine Shi}, title = {Oblivious Hashing Revisited, and Applications to Asymptotically Efficient {ORAM} and {OPRAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {924}, year = {2017}, url = {http://eprint.iacr.org/2017/924}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanGLS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranCOV17, author = {Nishanth Chandran and Wutichai Chongchitmate and Rafail Ostrovsky and Ivan Visconti}, title = {Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1092}, year = {2017}, url = {http://eprint.iacr.org/2017/1092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranCOV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGMV17, author = {Nishanth Chandran and Juan A. Garay and Payman Mohassel and Satyanarayana Vusirikala}, title = {Efficient, Constant-Round and Actively Secure {MPC:} Beyond the Three-Party Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2017}, url = {http://eprint.iacr.org/2017/519}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGRST17, author = {Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma and Shardul Tripathi}, title = {EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1109}, year = {2017}, url = {http://eprint.iacr.org/2017/1109}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGRST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangJMS17, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2017}, url = {http://eprint.iacr.org/2017/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangJMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangMSS17, author = {Donghoon Chang and Sweta Mishra and Somitra Kumar Sanadhya and Ajit Pratap Singh}, title = {On Making {U2F} Protocol Leakage-Resilient via Re-keying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {721}, year = {2017}, url = {http://eprint.iacr.org/2017/721}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangMSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseDGORRSZ17, author = {Melissa Chase and David Derler and Steven Goldfeder and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig and Greg Zaverucha}, title = {Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2017}, url = {http://eprint.iacr.org/2017/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseDGORRSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseGLLR17, author = {Melissa Chase and Ran Gilad{-}Bachrach and Kim Laine and Kristin E. Lauter and Peter Rindal}, title = {Private Collaborative Neural Network Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {762}, year = {2017}, url = {http://eprint.iacr.org/2017/762}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseGLLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeGKT17, author = {Sanjit Chatterjee and Deepak Garg and Aniket Kate and Tobias Theobald}, title = {Encrypting Messages for Incomplete Chains of Certificates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {777}, year = {2017}, url = {http://eprint.iacr.org/2017/777}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeGKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeGSMCM17, author = {Urbi Chatterjee and Vidya Govindan and Rajat Sadhukhan and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Debashis Mahata and Mukesh M. Prabhu}, title = {{PUF+IBE:} Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2017}, url = {http://eprint.iacr.org/2017/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeGSMCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeMP17, author = {Sanjit Chatterjee and Sayantan Mukherjee and Tapas Pandit}, title = {CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2017}, url = {http://eprint.iacr.org/2017/657}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeWPCR17, author = {Rahul Chatterjee and Joanne Woodage and Yuval Pnueli and Anusha Chowdhury and Thomas Ristenpart}, title = {The TypTop System: Personalized Typo-Tolerant Password Checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {810}, year = {2017}, url = {http://eprint.iacr.org/2017/810}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeWPCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chauvet17, author = {Jean{-}Marie Chauvet}, title = {Gimli, Lord of the Glittering {TRS-80}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {792}, year = {2017}, url = {http://eprint.iacr.org/2017/792}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chauvet17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHRSS17, author = {Ming{-}Shing Chen and Andreas H{\"{u}}lsing and Joost Rijneveld and Simona Samardjiska and Peter Schwabe}, title = {{SOFIA:} MQ-based signatures in the {QROM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2017}, url = {http://eprint.iacr.org/2017/680}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHRSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLMP17, author = {Yu Long Chen and Atul Luykx and Bart Mennink and Bart Preneel}, title = {Efficient Length Doubling From Tweakable Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2017}, url = {http://eprint.iacr.org/2017/841}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLP17, author = {Hao Chen and Kim Laine and Rachel Player}, title = {Simple Encrypted Arithmetic Library - {SEAL} v2.1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2017}, url = {http://eprint.iacr.org/2017/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLPX17, author = {Hao Chen and Kim Laine and Rachel Player and Yuhou Xia}, title = {High-Precision Arithmetic in Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {809}, year = {2017}, url = {http://eprint.iacr.org/2017/809}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLPX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLPYC17, author = {Ming{-}Shing Chen and Wen{-}Ding Li and Bo{-}Yuan Peng and Bo{-}Yin Yang and Chen{-}Mou Cheng}, title = {Implementing 128-bit Secure {MPKC} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2017}, url = {http://eprint.iacr.org/2017/636}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLPYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLR17, author = {Hao Chen and Kim Laine and Peter Rindal}, title = {Fast Private Set Intersection from Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2017}, url = {http://eprint.iacr.org/2017/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMYSG17, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, title = {Strong Authenticated Key Exchange with Auxiliary Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2017}, url = {http://eprint.iacr.org/2017/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMYSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenSNVGC17, author = {Zhi Chen and Junjie Shen and Alex Nicolau and Alexander V. Veidenbaum and Nahid Farhady Ghalaty and Rosario Cammarota}, title = {{CAMFAS:} {A} Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1083}, year = {2017}, url = {http://eprint.iacr.org/2017/1083}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenSNVGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZW17, author = {Long Chen and Zhenfeng Zhang and Xueqing Wang}, title = {Batched Multi-hop Multi-key {FHE} from ring-LWE with Compact Ciphertext Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {923}, year = {2017}, url = {http://eprint.iacr.org/2017/923}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cheng17, author = {Zhaohui Cheng}, title = {The {SM9} Cryptographic Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2017}, url = {http://eprint.iacr.org/2017/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cheng17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengI017, author = {Kuan Cheng and Yuval Ishai and Xin Li}, title = {Near-Optimal Secret Sharing and Error Correcting Codes in {AC0}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {927}, year = {2017}, url = {http://eprint.iacr.org/2017/927}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengI017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengZCZ0GS17, author = {Wei Cheng and Chao Zheng and Yuchen Cao and Yongbin Zhou and Hailong Zhang and Sylvain Guilley and Laurent Sauvage}, title = {How Far Can We Reach? Breaking RSM-Masked {AES-128} Implementation Using Only One Trace}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1144}, year = {2017}, url = {http://eprint.iacr.org/2017/1144}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengZCZ0GS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonHK17, author = {Jung Hee Cheon and Kyoohyung Han and Duhyeong Kim}, title = {Faster Bootstrapping of {FHE} over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2017}, url = {http://eprint.iacr.org/2017/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonHL17, author = {Jung Hee Cheon and Minki Hhan and Changmin Lee}, title = {Cryptanalysis of the Overstretched {NTRU} Problem for General Modulus Polynomial}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2017}, url = {http://eprint.iacr.org/2017/484}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheonHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonKS17, author = {Jung Hee Cheon and Miran Kim and Yong Soo Song}, title = {Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2017}, url = {http://eprint.iacr.org/2017/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChepurnoyDFZ17, author = {Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong{-}Sheng Zhou}, title = {TwinsCoin: {A} Cryptocurrency via Proof-of-Work and Proof-of-Stake}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2017}, url = {http://eprint.iacr.org/2017/232}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChepurnoyDFZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChiesaFS17, author = {Alessandro Chiesa and Michael A. Forbes and Nicholas Spooner}, title = {A Zero Knowledge Sumcheck and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2017}, url = {http://eprint.iacr.org/2017/305}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChiesaFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiGGI17, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, title = {Improving {TFHE:} faster packed homomorphic operations and efficient circuit bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2017}, url = {http://eprint.iacr.org/2017/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiGGI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoDG0MP17, author = {Chongwon Cho and Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou}, title = {Laconic Oblivious Transfer and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2017}, url = {http://eprint.iacr.org/2017/491}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoDG0MP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChongchitmateO17, author = {Wutichai Chongchitmate and Rafail Ostrovsky}, title = {Circuit-Private Multi-Key {FHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2017}, url = {http://eprint.iacr.org/2017/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChongchitmateO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChongchitmateOV17, author = {Wutichai Chongchitmate and Rafail Ostrovsky and Ivan Visconti}, title = {Resettably-Sound Resettable Zero Knowledge in Constant Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {925}, year = {2017}, url = {http://eprint.iacr.org/2017/925}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChongchitmateOV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chopra17, author = {Arjun Chopra}, title = {{GLYPH:} {A} New Insantiation of the {GLP} Digital Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {766}, year = {2017}, url = {http://eprint.iacr.org/2017/766}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chopra17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardSGPP17, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Decentralized Multi-Client Functional Encryption for Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2017}, url = {http://eprint.iacr.org/2017/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardSGPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chou17, author = {Tung Chou}, title = {McBits Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {793}, year = {2017}, url = {http://eprint.iacr.org/2017/793}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chou17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudaryP17, author = {Marios O. Choudary and Pantelimon George Popescu}, title = {Back to Massey: Impressively fast, scalable and tight security evaluation tools}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2017}, url = {http://eprint.iacr.org/2017/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudaryP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Choudhuri00KM17, author = {Arka Rai Choudhuri and Matthew Green and Abhishek Jain and Gabriel Kaptchuk and Ian Miers}, title = {Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1091}, year = {2017}, url = {http://eprint.iacr.org/2017/1091}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Choudhuri00KM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryPR17, author = {Ashish Choudhury and Arpita Patra and Divya Ravi}, title = {Round and Communication Efficient Unconditionally-secure {MPC} with t {\textless} n/3 in Partially Synchronous Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1006}, year = {2017}, url = {http://eprint.iacr.org/2017/1006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Christensen17, author = {Ren{\'{e}} B{\o}dker Christensen}, title = {On one-round reliable message transmission}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1042}, year = {2017}, url = {http://eprint.iacr.org/2017/1042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Christensen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiOSV17, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, title = {Round-Optimal Secure Two-Party Computation from Trapdoor Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {920}, year = {2017}, url = {http://eprint.iacr.org/2017/920}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiOSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiOSV17a, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, title = {Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {931}, year = {2017}, url = {http://eprint.iacr.org/2017/931}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiOSV17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CidHPSS17, author = {Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song}, title = {Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {693}, year = {2017}, url = {http://eprint.iacr.org/2017/693}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CidHPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CilardoP17, author = {Alessandro Cilardo and Andrea Primativo}, title = {Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1246}, year = {2017}, url = {http://eprint.iacr.org/2017/1246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CilardoP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ClearM17, author = {Michael Clear and Ciaran McGoldrick}, title = {Attribute-Based Group Homomorphic Encryption and Additively Homomorphic {IBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {752}, year = {2017}, url = {http://eprint.iacr.org/2017/752}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ClearM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoelhoLC17, author = {Fabien Coelho and Arnaud Larroche and Baptiste Colin}, title = {Itsuku: a Memory-Hardened Proof-of-Work Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1168}, year = {2017}, url = {http://eprint.iacr.org/2017/1168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoelhoLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cohen17, author = {Aloni Cohen}, title = {What about Bob? The Inadequacy of {CPA} Security for Proxy Reencryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {785}, year = {2017}, url = {http://eprint.iacr.org/2017/785}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cohen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenCGZ17, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, title = {Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2017}, url = {http://eprint.iacr.org/2017/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenCGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cohn-GordonC17, author = {Katriel Cohn{-}Gordon and Cas Cremers}, title = {Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {982}, year = {2017}, url = {http://eprint.iacr.org/2017/982}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cohn-GordonC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cohn-GordonCGMM17, author = {Katriel Cohn{-}Gordon and Cas Cremers and Luke Garratt and Jon Millican and Kevin Milner}, title = {On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {666}, year = {2017}, url = {http://eprint.iacr.org/2017/666}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cohn-GordonCGMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CojocarPT17, author = {Lucian Cojocar and Kostas Papagiannopoulos and Niek Timmers}, title = {Instruction Duplication: Leaky and Not Too Fault-Tolerant!}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1082}, year = {2017}, url = {http://eprint.iacr.org/2017/1082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CojocarPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiDGS17, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo and John P. Steinberger}, title = {Random Oracles and Non-Uniformity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {937}, year = {2017}, url = {http://eprint.iacr.org/2017/937}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiDGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Coron17, author = {Jean{-}S{\'{e}}bastien Coron}, title = {High-Order Conversion From Boolean to Arithmetic Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2017}, url = {http://eprint.iacr.org/2017/252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Coron17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Coron17a, author = {Jean{-}S{\'{e}}bastien Coron}, title = {Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {879}, year = {2017}, url = {http://eprint.iacr.org/2017/879}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Coron17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronRZ17, author = {Jean{-}S{\'{e}}bastien Coron and Franck Rondepierre and Rina Zeitoun}, title = {High Order Masking of Look-up Tables with Common Shares}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2017}, url = {http://eprint.iacr.org/2017/271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronRZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorreGD17, author = {Yann Le Corre and Johann Gro{\ss}sch{\"{a}}dl and Daniel Dinu}, title = {Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on {ARM} Cortex-M3 Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1253}, year = {2017}, url = {http://eprint.iacr.org/2017/1253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorreGD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Corrigan-GibbsK17, author = {Henry Corrigan{-}Gibbs and Dmitry Kogan}, title = {The Discrete-Logarithm Problem with Preprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1113}, year = {2017}, url = {http://eprint.iacr.org/2017/1113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Corrigan-GibbsK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostaMM17, author = {N{\'{u}}ria Costa and Ramiro Mart{\'{\i}}nez and Paz Morillo}, title = {Proof of a shuffle for lattice-based cryptography (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {900}, year = {2017}, url = {http://eprint.iacr.org/2017/900}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostaMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostacheS17, author = {Anamaria Costache and Nigel P. Smart}, title = {Homomorphic Encryption without Gaussian Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2017}, url = {http://eprint.iacr.org/2017/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostacheS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloH17, author = {Craig Costello and H{\"{u}}seyin Hisil}, title = {A simple and compact algorithm for {SIDH} with arbitrary degree isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {504}, year = {2017}, url = {http://eprint.iacr.org/2017/504}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloS17, author = {Craig Costello and Benjamin Smith}, title = {Montgomery curves and their arithmetic: The case of large characteristic fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2017}, url = {http://eprint.iacr.org/2017/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourousseBRJPL17, author = {Damien Courouss{\'{e}} and Thierno Barry and Bruno Robisson and Philippe Jaillon and Olivier Potin and Jean{-}Louis Lanet}, title = {Runtime Code Polymorphism as a Protection Against Side Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {699}, year = {2017}, url = {http://eprint.iacr.org/2017/699}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourousseBRJPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisSDPOSB17, author = {Nicolas T. Courtois and Klaus Schmeh and J{\"{o}}rg Drobick and Jacques Patarin and Maria{-}Bristena Oprisanu and Matteo Scarlata and Om Bhallamudi}, title = {Cryptographic Security Analysis of {T-310}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2017}, url = {http://eprint.iacr.org/2017/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisSDPOSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CousinsCGKPRRS17, author = {David Bruce Cousins and Giovanni Di Crescenzo and Kamil Doruk G{\"{u}}r and Kevin King and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savas}, title = {Implementing Conjunction Obfuscation under Entropic Ring {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {844}, year = {2017}, url = {http://eprint.iacr.org/2017/844}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CousinsCGKPRRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrepeauY17, author = {Claude Cr{\'{e}}peau and Nan Yang}, title = {Multi-Prover Interactive Proofs: Unsound Foundations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2017}, url = {http://eprint.iacr.org/2017/229}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrepeauY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CzajkowskiBHSU17, author = {Jan Czajkowski and Leon Groot Bruinderink and Andreas H{\"{u}}lsing and Christian Schaffner and Dominique Unruh}, title = {Post-quantum security of the sponge construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {771}, year = {2017}, url = {http://eprint.iacr.org/2017/771}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CzajkowskiBHSU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGK17, author = {Dana Dachman{-}Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1127}, year = {2017}, url = {http://eprint.iacr.org/2017/1127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledKS17, author = {Dana Dachman{-}Soled and Mukul Kulkarni and Aria Shahverdi}, title = {Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2017}, url = {http://eprint.iacr.org/2017/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledKS17a, author = {Dana Dachman{-}Soled and Mukul Kulkarni and Aria Shahverdi}, title = {Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2017}, url = {http://eprint.iacr.org/2017/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledKS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenMA17, author = {Joan Daemen and Bart Mennink and Gilles Van Assche}, title = {Full-State Keyed Duplex With Built-In Multi-User Support}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2017}, url = {http://eprint.iacr.org/2017/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DahlPP17, author = {Morten Dahl and Valerio Pastro and Mathieu Poumeyrol}, title = {Private Data Aggregation on a Budget}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2017}, url = {http://eprint.iacr.org/2017/643}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DahlPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiDPRSSS17, author = {Wei Dai and Yarkin Dor{\"{o}}z and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savas and Berk Sunar}, title = {Implementation and Evaluation of a Lattice-Based Key-Policy {ABE} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2017}, url = {http://eprint.iacr.org/2017/601}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiDPRSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiHT17, author = {Wei Dai and Viet Tung Hoang and Stefano Tessaro}, title = {Information-theoretic Indistinguishability via the Chi-squared Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2017}, url = {http://eprint.iacr.org/2017/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiSST17, author = {Yuanxi Dai and Yannick Seurin and John P. Steinberger and Aishwarya Thiruvengadam}, title = {Five Rounds are Sufficient and Necessary for the Indifferentiability of Iterated Even-Mansour}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2017}, url = {http://eprint.iacr.org/2017/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiSST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DalskovO17, author = {Anders P. K. Dalskov and Claudio Orlandi}, title = {Assessing the No-Knowledge Property of SpiderOak {ONE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2017}, url = {http://eprint.iacr.org/2017/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DalskovO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardLOSS17, author = {Ivan Damg{\aa}rd and Ji Luo and Sabine Oechsner and Peter Scholl and Mark Simkin}, title = {Compact Zero-Knowledge Proofs of Small Hamming Weight}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1041}, year = {2017}, url = {http://eprint.iacr.org/2017/1041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardLOSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardOS17, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Mark Simkin}, title = {Yet Another Compiler for Active Security or: Efficient {MPC} Over Arbitrary Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {908}, year = {2017}, url = {http://eprint.iacr.org/2017/908}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaniKMSZ17, author = {Varsha Dani and Valerie King and Mahnush Movahedi and Jared Saia and Mahdi Zamani}, title = {Secure Multi-Party Computation in Large Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2017}, url = {http://eprint.iacr.org/2017/1003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaniKMSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Das0MK17, author = {Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate}, title = {Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {954}, year = {2017}, url = {http://eprint.iacr.org/2017/954}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Das0MK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasSA17, author = {Bibhas Chandra Das and Md Kutubuddin Sardar and Avishek Adhikari}, title = {Efficient Constructions for t- (k, n)\({}^{\mbox{*}}\)-Random Grid Visual Cryptographic Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {779}, year = {2017}, url = {http://eprint.iacr.org/2017/779}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DataP17, author = {Deepesh Data and Manoj Prabhakaran}, title = {Towards Characterizing Securely Computable Two-Party Randomized Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2017}, url = {http://eprint.iacr.org/2017/692}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DataP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDM17, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Attribute-Based Signatures for Turing Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {801}, year = {2017}, url = {http://eprint.iacr.org/2017/801}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDN0Z17, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang}, title = {Single Key Variant of PMAC{\_}Plus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {848}, year = {2017}, url = {http://eprint.iacr.org/2017/848}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDN0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaLMN17, author = {Nilanjan Datta and Atul Luykx and Bart Mennink and Mridul Nandi}, title = {Understanding {RUP} Integrity of {COLM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2017}, url = {http://eprint.iacr.org/2017/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaLMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidDL17, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, title = {Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {899}, year = {2017}, url = {http://eprint.iacr.org/2017/899}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidGKR17, author = {Bernardo Machado David and Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2017}, url = {http://eprint.iacr.org/2017/573}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidGKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaM17, author = {Vanesa Daza and Nikolaos Makriyannis}, title = {Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2017}, url = {http://eprint.iacr.org/2017/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Debris-AlazardS17, author = {Thomas Debris{-}Alazard and Nicolas Sendrier and Jean{-}Pierre Tillich}, title = {A new signature scheme based on (U{\(\vert\)}U+V) codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2017}, url = {http://eprint.iacr.org/2017/662}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Debris-AlazardS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Delgado-SeguraP17, author = {Sergi Delgado{-}Segura and Cristina P{\'{e}}rez{-}Sol{\`{a}} and Guillermo Navarro{-}Arribas and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {A Fair Protocol for Data Trading Based on Bitcoin Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1018}, year = {2017}, url = {http://eprint.iacr.org/2017/1018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Delgado-SeguraP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Delgado-SeguraP17a, author = {Sergi Delgado{-}Segura and Cristina P{\'{e}}rez{-}Sol{\`{a}} and Guillermo Navarro{-}Arribas and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Analysis of the Bitcoin {UTXO} set}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1095}, year = {2017}, url = {http://eprint.iacr.org/2017/1095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Delgado-SeguraP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Delvaux17, author = {Jeroen Delvaux}, title = {Machine Learning Attacks on PolyPUF, OB-PUF, RPUF, and {PUF-FSM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1134}, year = {2017}, url = {http://eprint.iacr.org/2017/1134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Delvaux17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemertzisPP17, author = {Ioannis Demertzis and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {749}, year = {2017}, url = {http://eprint.iacr.org/2017/749}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DemertzisPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengGXGDS17, author = {Shuwen Deng and Doguhan G{\"{u}}m{\"{u}}soglu and Wenjie Xiong and Y. Serhan Gener and Onur Demir and Jakub Szefer}, title = {SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2017}, url = {http://eprint.iacr.org/2017/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengGXGDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengSYC17, author = {Yi Deng and Xuyang Song and Jingyue Yu and Yu Chen}, title = {On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2017}, url = {http://eprint.iacr.org/2017/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengSYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DequenIT17, author = {Gilles Dequen and Sorina Ionica and Monika Trimoska}, title = {Parallel Collision Search with Radix Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2017}, url = {http://eprint.iacr.org/2017/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DequenIT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerRS17, author = {David Derler and Sebastian Ramacher and Daniel Slamanig}, title = {Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2017}, url = {http://eprint.iacr.org/2017/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerRS17a, author = {David Derler and Sebastian Ramacher and Daniel Slamanig}, title = {Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1154}, year = {2017}, url = {http://eprint.iacr.org/2017/1154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerRS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerRS17b, author = {David Derler and Sebastian Ramacher and Daniel Slamanig}, title = {Short Double- and N-Times-Authentication-Preventing Signatures from {ECDSA} and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1203}, year = {2017}, url = {http://eprint.iacr.org/2017/1203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerRS17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Devadas0X17, author = {Srinivas Devadas and Ling Ren and Hanshen Xiao}, title = {On Iterative Collision Search for {LPN} and Subset Sum}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {904}, year = {2017}, url = {http://eprint.iacr.org/2017/904}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Devadas0X17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dey017, author = {Sabyasachi Dey and Santanu Sarkar}, title = {Settling the mystery of Z\({}_{\mbox{r=r}}\) in {RC4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1072}, year = {2017}, url = {http://eprint.iacr.org/2017/1072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dey017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeyG17, author = {Sankhanil Dey and Ranjan Ghosh}, title = {Multiplication and Division over Extended Galois Field GF(p\({}^{\mbox{q}}\)): {A} new Approach to find Monic Irreducible Polynomials over any Galois Field GF(p\({}^{\mbox{q}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2017}, url = {http://eprint.iacr.org/2017/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeyG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeyG17a, author = {Sankhanil Dey and Ranjan Ghosh}, title = {A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1161}, year = {2017}, url = {http://eprint.iacr.org/2017/1161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeyG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeyS17, author = {Sabyasachi Dey and Santanu Sarkar}, title = {Cryptanalysis of full round Fruit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2017}, url = {http://eprint.iacr.org/2017/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeyS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DharYKC17, author = {Aritra Dhar and Der{-}Yeuan Yu and Kari Kostiainen and Srdjan Capkun}, title = {IntegriKey: End-to-End Integrity Protection of User Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1245}, year = {2017}, url = {http://eprint.iacr.org/2017/1245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DharYKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Diehl17, author = {William Diehl}, title = {Attack on {AES} Implementation Exploiting Publicly-visible Partial Result}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {788}, year = {2017}, url = {http://eprint.iacr.org/2017/788}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Diehl17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkJMNR17, author = {Marten van Dijk and Chenglu Jin and Hoda Maleki and Phuong Ha Nguyen and Reza Rahaeimehr}, title = {Weak-Unforgeable Tags for Secure Supply Chain Management}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1221}, year = {2017}, url = {http://eprint.iacr.org/2017/1221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkJMNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dimitriou17, author = {Tassos Dimitriou}, title = {Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1035}, year = {2017}, url = {http://eprint.iacr.org/2017/1035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dimitriou17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingFR17, author = {Jintai Ding and Scott R. Fluhrer and Saraswathy RV}, title = {Complete Attack on {RLWE} Key Exchange with reused keys, without Signal Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1185}, year = {2017}, url = {http://eprint.iacr.org/2017/1185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingFR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingPPS17, author = {Jintai Ding and Ray A. Perlner and Albrecht Petzoldt and Daniel Smith{-}Tone}, title = {Improved Cryptanalysis of HFEv- via Projection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1149}, year = {2017}, url = {http://eprint.iacr.org/2017/1149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurN17, author = {Itai Dinur and Niv Nadler}, title = {Time-Memory Tradeoff Attacks on the {MTP} Proof-of-Work Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2017}, url = {http://eprint.iacr.org/2017/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisF17, author = {Yevgeniy Dodis and Dario Fiore}, title = {Unilaterally-Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2017}, url = {http://eprint.iacr.org/2017/109}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKSTZ17, author = {Yevgeniy Dodis and Jonathan Katz and John P. Steinberger and Aishwarya Thiruvengadam and Zhe Zhang}, title = {Provable Security of Substitution-Permutation Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2017}, url = {http://eprint.iacr.org/2017/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKSTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoernerS17, author = {Jack Doerner and Abhi Shelat}, title = {Scaling {ORAM} for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {827}, year = {2017}, url = {http://eprint.iacr.org/2017/827}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoernerS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoliskaniPB17, author = {Javad Doliskani and Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto}, title = {Faster Cryptographic Hash Function From Supersingular Isogeny Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1202}, year = {2017}, url = {http://eprint.iacr.org/2017/1202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoliskaniPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongHLK17, author = {Qiuxiang Dong and Dijiang Huang and Jim Luo and Myong H. Kang}, title = {{HIR-CP-ABE:} Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1101}, year = {2017}, url = {http://eprint.iacr.org/2017/1101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongHLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongHLK17a, author = {Qiuxiang Dong and Dijiang Huang and Jim Luo and Myong H. Kang}, title = {{ID-HABE:} Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1102}, year = {2017}, url = {http://eprint.iacr.org/2017/1102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongHLK17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongLW17, author = {Xiaoyang Dong and Zheng Li and Xiaoyun Wang}, title = {Quantum Cryptanalysis on Some Generalized Feistel Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1249}, year = {2017}, url = {http://eprint.iacr.org/2017/1249}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongLWQ17, author = {Xiaoyang Dong and Zheng Li and Xiaoyun Wang and Ling Qin}, title = {Cube-like Attack on Round-Reduced Initialization of Ketje Sr}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2017}, url = {http://eprint.iacr.org/2017/159}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongLWQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongM17, author = {Le Dong and Yongxia Mao}, title = {Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1071}, year = {2017}, url = {http://eprint.iacr.org/2017/1071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongW17, author = {Xiaoyang Dong and Xiaoyun Wang}, title = {Quantum Key-recovery Attack on Feistel Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1199}, year = {2017}, url = {http://eprint.iacr.org/2017/1199}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DorozHPSSWZ17, author = {Yarkin Dor{\"{o}}z and Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman and Berk Sunar and William Whyte and Zhenfei Zhang}, title = {Fully Homomorphic Encryption from the Finite Field Isomorphism Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2017}, url = {http://eprint.iacr.org/2017/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DorozHPSSWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingFKS17, author = {Nico D{\"{o}}ttling and Nils Fleischhacker and Johannes Krupp and Dominique Schr{\"{o}}der}, title = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {958}, year = {2017}, url = {http://eprint.iacr.org/2017/958}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingFKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingG17, author = {Nico D{\"{o}}ttling and Sanjam Garg}, title = {Identity-Based Encryption from the Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2017}, url = {http://eprint.iacr.org/2017/543}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingG17a, author = {Nico D{\"{o}}ttling and Sanjam Garg}, title = {From Selective {IBE} to Full {IBE} and Selective {HIBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {957}, year = {2017}, url = {http://eprint.iacr.org/2017/957}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGHM17, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny}, title = {New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {978}, year = {2017}, url = {http://eprint.iacr.org/2017/978}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGNNT17, author = {Nico D{\"{o}}ttling and Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges and Roberto Trifiletti}, title = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {790}, year = {2017}, url = {http://eprint.iacr.org/2017/790}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGNNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingNO17, author = {Nico D{\"{o}}ttling and Jesper Buus Nielsen and Maciej Obremski}, title = {Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2017}, url = {http://eprint.iacr.org/2017/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingNO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DruckerG17, author = {Nir Drucker and Shay Gueron}, title = {A toolbox for software optimization of {QC-MDPC} code-based cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1251}, year = {2017}, url = {http://eprint.iacr.org/2017/1251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DruckerG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuW17, author = {Yusong Du and Baodian Wei}, title = {On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {988}, year = {2017}, url = {http://eprint.iacr.org/2017/988}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Duarte17, author = {Eduardo Ruiz Duarte}, title = {Reduced Mumford divisors of a genus 2 curve through its jacobian function field}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2017}, url = {http://eprint.iacr.org/2017/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Duarte17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dubois17, author = {Renaud Dubois}, title = {Trapping {ECC} with Invalid Curve Bug Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2017}, url = {http://eprint.iacr.org/2017/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dubois17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ducas17, author = {L{\'{e}}o Ducas}, title = {Shortest Vector from Lattice Sieving: a Few Dimensions for Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {999}, year = {2017}, url = {http://eprint.iacr.org/2017/999}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ducas17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasLLSSS17, author = {L{\'{e}}o Ducas and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehl{\'{e}}}, title = {{CRYSTALS} - Dilithium: Digital Signatures from Module Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2017}, url = {http://eprint.iacr.org/2017/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucasLLSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasP17, author = {L{\'{e}}o Ducas and Alice Pellet{-}Mary}, title = {On the Statistical Leak of the {GGH13} Multilinear Map and some Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2017}, url = {http://eprint.iacr.org/2017/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucasP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DumitrescuSS17, author = {Dragos Dumitrescu and Ioan{-}Mihail Stan and Emil Simion}, title = {Steganography techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2017}, url = {http://eprint.iacr.org/2017/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DumitrescuSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongYT17, author = {Dung Hoang Duong and Masaya Yasuda and Tsuyoshi Takagi}, title = {Choosing Parameters for the Subfield Lattice Attack against overstretched {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2017}, url = {http://eprint.iacr.org/2017/959}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuongYT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupontHPRY17, author = {Pierre{-}Alain Dupont and Julia Hesse and David Pointcheval and Leonid Reyzin and Sophia Yakoubov}, title = {Fuzzy Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1111}, year = {2017}, url = {http://eprint.iacr.org/2017/1111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupontHPRY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurakV17, author = {F. Bet{\"{u}}l Durak and Serge Vaudenay}, title = {Breaking the {FF3} Format-Preserving Encryption Standard Over Small Domains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2017}, url = {http://eprint.iacr.org/2017/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurakV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuttaJN17, author = {Avijit Dutta and Ashwin Jha and Mridul Nandi}, title = {Tight Security Analysis of EHtM {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {837}, year = {2017}, url = {http://eprint.iacr.org/2017/837}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuttaJN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiEFM17, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski}, title = {{PERUN:} Virtual Payment Channels over Cryptographic Currencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2017}, url = {http://eprint.iacr.org/2017/635}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiEFM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Eaton17, author = {Edward Eaton}, title = {Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2017}, url = {http://eprint.iacr.org/2017/607}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Eaton17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EcclesH17, author = {Tom Eccles and Basel Halak}, title = {A Secure and Private Billing Protocol for Smart Metering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2017}, url = {http://eprint.iacr.org/2017/654}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EcclesH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EckeyFL17, author = {Lisa Eckey and Sebastian Faust and Julian Loss}, title = {Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {915}, year = {2017}, url = {http://eprint.iacr.org/2017/915}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EckeyFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EichlsederK17, author = {Maria Eichlseder and Daniel Kales}, title = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1136}, year = {2017}, url = {http://eprint.iacr.org/2017/1136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EichlsederK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EisentragerHM17, author = {Kirsten Eisentr{\"{a}}ger and Sean Hallgren and Travis Morrison}, title = {On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2017}, url = {http://eprint.iacr.org/2017/986}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EisentragerHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ekera17, author = {Martin Eker{\aa}}, title = {On post-processing in the quantum algorithm for computing short discrete logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1122}, year = {2017}, url = {http://eprint.iacr.org/2017/1122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ekera17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EkeraH17, author = {Martin Eker{\aa} and Johan H{\aa}stad}, title = {Quantum algorithms for computing short discrete logarithms and factoring {RSA} integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2017}, url = {http://eprint.iacr.org/2017/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EkeraH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Emura17, author = {Keita Emura}, title = {Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2017}, url = {http://eprint.iacr.org/2017/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Emura17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EnderG0P17, author = {Maik Ender and Samaneh Ghandali and Amir Moradi and Christof Paar}, title = {The First Thorough Side-Channel Hardware Trojan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {865}, year = {2017}, url = {http://eprint.iacr.org/2017/865}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EnderG0P17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EnderWM17, author = {Maik Ender and Alexander Wild and Amir Moradi}, title = {SafeDRP: Yet Another Way Toward Power-Equalized Designs in {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2017}, url = {http://eprint.iacr.org/2017/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EnderWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EndignouxV17, author = {Guillaume Endignoux and Damian Viz{\'{a}}r}, title = {Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2017}, url = {http://eprint.iacr.org/2017/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EndignouxV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EsfahaniGS17, author = {Navid Nasr Esfahani and Ian Goldberg and Douglas R. Stinson}, title = {Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2017}, url = {http://eprint.iacr.org/2017/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EsfahaniGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EspelKR17, author = {Thomas Espel and Laurent Katz and Guillaume Robin}, title = {Proposal for Protocol on a Quorum Blockchain with Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1093}, year = {2017}, url = {http://eprint.iacr.org/2017/1093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EspelKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EspitauFGT17, author = {Thomas Espitau and Pierre{-}Alain Fouque and Beno{\^{\i}}t G{\'{e}}rard and Mehdi Tibouchi}, title = {Side-Channel Attacks on {BLISS} Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2017}, url = {http://eprint.iacr.org/2017/505}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EspitauFGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EsserKM17, author = {Andre Esser and Robert K{\"{u}}bler and Alexander May}, title = {{LPN} Decoded}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2017}, url = {http://eprint.iacr.org/2017/078}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EsserKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EverspaughPRS17, author = {Adam Everspaugh and Kenneth G. Paterson and Thomas Ristenpart and Samuel Scott}, title = {Key Rotation for Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2017}, url = {http://eprint.iacr.org/2017/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EverspaughPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FabsicHSZG017, author = {Tom{\'{a}}s Fabsic and Viliam Hromada and Paul Stankovski and Pavol Zajac and Qian Guo and Thomas Johansson}, title = {A Reaction Attack on the {QC-LDPC} McEliece Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2017}, url = {http://eprint.iacr.org/2017/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FabsicHSZG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanGK17, author = {Xiong Fan and Chaya Ganesh and Vladimir Kolesnikov}, title = {Hashing Garbled Circuits for Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2017}, url = {http://eprint.iacr.org/2017/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanL17, author = {Xiong Fan and Feng{-}Hao Liu}, title = {Proxy Re-Encryption and Re-Signatures from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2017}, url = {http://eprint.iacr.org/2017/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanTL17, author = {Chun{-}I Fan and Yi{-}Fan Tseng and Chih{-}Wen Lin}, title = {Attribute-Based Encryption from Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2017}, url = {http://eprint.iacr.org/2017/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanZ17, author = {Lei Fan and Hong{-}Sheng Zhou}, title = {iChing: {A} Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {656}, year = {2017}, url = {http://eprint.iacr.org/2017/656}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FanZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarrasKMP17, author = {Oriol Farr{\`{a}}s and Tarik Kaced and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Carles Padr{\'{o}}}, title = {Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {919}, year = {2017}, url = {http://eprint.iacr.org/2017/919}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarrasKMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarshimKV17, author = {Pooya Farshim and Louiza Khati and Damien Vergnaud}, title = {Security of Even-Mansour Ciphers under Key-Dependent Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2017}, url = {http://eprint.iacr.org/2017/475}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarshimKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarshimOR17, author = {Pooya Farshim and Claudio Orlandi and Razvan Rosie}, title = {Security of Symmetric Primitives under Incorrect Usage of Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2017}, url = {http://eprint.iacr.org/2017/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarshimOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaugereHKKKP17, author = {Jean{-}Charles Faug{\`{e}}re and Kelsey Horan and Delaram Kahrobaei and Marc Kaplan and Elham Kashefi and Ludovic Perret}, title = {Fast Quantum Algorithm for Solving Multivariate Quadratic Equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1236}, year = {2017}, url = {http://eprint.iacr.org/2017/1236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaugereHKKKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauskangerS17, author = {Stian Fauskanger and Igor A. Semaev}, title = {Separable Statistics and Multidimensional Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {994}, year = {2017}, url = {http://eprint.iacr.org/2017/994}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauskangerS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustGPPS17, author = {Sebastian Faust and Vincent Grosso and Santos Merino Del Pozo and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2017}, url = {http://eprint.iacr.org/2017/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustGPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHM017, author = {Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee and Daniele Venturi}, title = {Non-Malleable Codes for Space-Bounded Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2017}, url = {http://eprint.iacr.org/2017/530}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustHM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustPS17, author = {Sebastian Faust and Clara Paglialonga and Tobias Schneider}, title = {Amortizing Randomness Complexity in Private Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2017}, url = {http://eprint.iacr.org/2017/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziLS017, author = {Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {An Efficient Pairing-Based Shuffle Argument}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {894}, year = {2017}, url = {http://eprint.iacr.org/2017/894}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziLS017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Faz-HernandezLO17, author = {Armando Faz{-}Hern{\'{a}}ndez and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Eduardo Ochoa{-}Jim{\'{e}}nez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1015}, year = {2017}, url = {http://eprint.iacr.org/2017/1015}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Faz-HernandezLO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FehrS17, author = {Serge Fehr and Louis Salvail}, title = {Quantum Authentication and Encryption with Key Recycling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2017}, url = {http://eprint.iacr.org/2017/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FehrS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengQZLCF17, author = {Wei Feng and Yu Qin and Shijun Zhao and Ziwen Liu and XiaoBo Chu and Dengguo Feng}, title = {Secure Code Updates for Smart Embedded Devices based on PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {991}, year = {2017}, url = {http://eprint.iacr.org/2017/991}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FengQZLCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiN17, author = {Houda Ferradi and David Naccache}, title = {Integer Reconstruction Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1231}, year = {2017}, url = {http://eprint.iacr.org/2017/1231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerreiraLD17, author = {Bernardo Ferreira and Jo{\~{a}}o Leit{\~{a}}o and Henrique Jo{\~{a}}o L. Domingos}, title = {Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2017}, url = {http://eprint.iacr.org/2017/315}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FerreiraLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerreiraLD17a, author = {Bernardo Ferreira and Jo{\~{a}}o Leit{\~{a}}o and Henrique Jo{\~{a}}o L. Domingos}, title = {MuSE: Multimodal Searchable Encryption for Cloud Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2017}, url = {http://eprint.iacr.org/2017/661}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FerreiraLD17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerschKP17, author = {Manuel Fersch and Eike Kiltz and Bertram Poettering}, title = {On the One-Per-Message Unforgeability of {(EC)DSA} and its Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {890}, year = {2017}, url = {http://eprint.iacr.org/2017/890}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerschKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreVS17, author = {Dario Fiore and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Claudio Soriente}, title = {Partitioned Group Password-Based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2017}, url = {http://eprint.iacr.org/2017/141}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FioreVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinG17, author = {Marc Fischlin and Felix G{\"{u}}nther}, title = {Replay Attacks on Zero Round-Trip Time: The Case of the {TLS} 1.3 Handshake Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2017}, url = {http://eprint.iacr.org/2017/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinGMP17, author = {Marc Fischlin and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Kenneth G. Paterson}, title = {Data Is a Stream: Security of Stream-Based Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1191}, year = {2017}, url = {http://eprint.iacr.org/2017/1191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinGMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinM17, author = {Marc Fischlin and Sogol Mazaheri}, title = {Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {984}, year = {2017}, url = {http://eprint.iacr.org/2017/984}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer17, author = {Scott R. Fluhrer}, title = {Further Analysis of a Proposed Hash-Based Signature Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2017}, url = {http://eprint.iacr.org/2017/553}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fluhrer17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer17a, author = {Scott R. Fluhrer}, title = {Reassessing Grover's Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {811}, year = {2017}, url = {http://eprint.iacr.org/2017/811}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fluhrer17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FontaineV17, author = {David Fontaine and Olivier Vivolo}, title = {Proposal of primitive polynomials for Linux kernel {PRNG}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {726}, year = {2017}, url = {http://eprint.iacr.org/2017/726}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FontaineV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ForlerLLW17, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Reforgeability of Authenticated Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2017}, url = {http://eprint.iacr.org/2017/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ForlerLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrederiksenPY17, author = {Tore Kasper Frederiksen and Benny Pinkas and Avishay Yanai}, title = {Committed {MPC} - Maliciously Secure Multiparty Computation from Homomorphic Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2017}, url = {http://eprint.iacr.org/2017/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrederiksenPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuF17, author = {Shihui Fu and Xiutao Feng}, title = {Involutory Differentially 4-Uniform Permutations from Known Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2017}, url = {http://eprint.iacr.org/2017/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuFW17, author = {Shihui Fu and Xiutao Feng and Baofeng Wu}, title = {Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2017}, url = {http://eprint.iacr.org/2017/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuFW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuWC17, author = {Ximing Fu and Xiaoyun Wang and Jiazhe Chen}, title = {Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2017}, url = {http://eprint.iacr.org/2017/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuWWXW17, author = {Shan Fu and Zongyue Wang and Fanxing Wei and Guoai Xu and An Wang}, title = {Linear Regression Side Channel Attack Applied on Constant {XOR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1217}, year = {2017}, url = {http://eprint.iacr.org/2017/1217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuWWXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fuchsbauer17, author = {Georg Fuchsbauer}, title = {Subversion-zero-knowledge SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {587}, year = {2017}, url = {http://eprint.iacr.org/2017/587}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fuchsbauer17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerGKO17, author = {Georg Fuchsbauer and Romain Gay and Lucas Kowalczyk and Claudio Orlandi}, title = {Access Control Encryption for Equality, Comparison, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2017}, url = {http://eprint.iacr.org/2017/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerGKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujitaK17, author = {Maiki Fujita and Takeshi Koshiba}, title = {Perfectly Secure Message Transmission Scheme against Rational Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2017}, url = {http://eprint.iacr.org/2017/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujitaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FyrbiakWSHHWWTP17, author = {Marc Fyrbiak and Sebastian Wallat and Pawel Swierczynski and Max Hoffmann and Sebastian Hoppach and Matthias Wilhelm and Tobias Weidlich and Russell Tessier and Christof Paar}, title = {{HAL-} The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {783}, year = {2017}, url = {http://eprint.iacr.org/2017/783}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FyrbiakWSHHWWTP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaboritHPT17, author = {Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean{-}Pierre Tillich}, title = {Identity-based Encryption from Codes with Rank Metric}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2017}, url = {http://eprint.iacr.org/2017/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaboritHPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GadiyarP17, author = {H. Gopalakrishna Gadiyar and R. Padma}, title = {The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2017}, url = {http://eprint.iacr.org/2017/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GadiyarP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GagliardoniKK17, author = {Tommaso Gagliardoni and Nikolaos P. Karvelas and Stefan Katzenbeisser}, title = {ORAMs in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2017}, url = {http://eprint.iacr.org/2017/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GagliardoniKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithV17, author = {Steven D. Galbraith and Frederik Vercauteren}, title = {Computational problems in supersingular elliptic curve isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {774}, year = {2017}, url = {http://eprint.iacr.org/2017/774}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GallinCT17, author = {Gabriel Gallin and T{\"{u}}rk{\"{u}} {\"{O}}zl{\"{u}}m {\c{C}}elik and Arnaud Tisserand}, title = {Architecture level Optimizations for Kummer based {HECC} on FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1009}, year = {2017}, url = {http://eprint.iacr.org/2017/1009}, timestamp = {Sat, 03 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GallinCT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaltelandG17, author = {Herman Galteland and Kristian Gj{\o}steen}, title = {Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1007}, year = {2017}, url = {http://eprint.iacr.org/2017/1007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaltelandG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GancherGL17, author = {Joshua Gancher and Adam Groce and Alex Ledger}, title = {Externally Verifiable Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2017}, url = {http://eprint.iacr.org/2017/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GancherGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaneshP17, author = {Chaya Ganesh and Arpita Patra}, title = {Optimal Extension Protocols for Byzantine Broadcast and Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2017}, url = {http://eprint.iacr.org/2017/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaneshP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GanjiTS17, author = {Fatemeh Ganji and Shahin Tajik and Jean{-}Pierre Seifert}, title = {Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {551}, year = {2017}, url = {http://eprint.iacr.org/2017/551}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GanjiTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoDLL17, author = {Xinwei Gao and Jintai Ding and Jiqiang Liu and Lin Li}, title = {Post-Quantum Secure Remote Password Protocol from {RLWE} Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2017}, url = {http://eprint.iacr.org/2017/1196}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoDLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoDLRL17, author = {Xinwei Gao and Jintai Ding and Lin Li and Saraswathy RV and Jiqiang Liu}, title = {Efficient Implementation of Password-Based Authenticated Key Exchange from {RLWE} and Post-Quantum {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1192}, year = {2017}, url = {http://eprint.iacr.org/2017/1192}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoDLRL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoDRLL17, author = {Xinwei Gao and Jintai Ding and Saraswathy RV and Lin Li and Jiqiang Liu}, title = {Comparison analysis and efficient implementation of reconciliation-based {RLWE} key exchange protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1178}, year = {2017}, url = {http://eprint.iacr.org/2017/1178}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoDRLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayIOZ17, author = {Juan A. Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, title = {The Price of Low Communication in Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2017}, url = {http://eprint.iacr.org/2017/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayIOZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKP17, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, title = {Proofs of Work for Blockchain Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {775}, year = {2017}, url = {http://eprint.iacr.org/2017/775}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargKP17, author = {Sanjam Garg and Susumu Kiyoshima and Omkant Pandey}, title = {On the Exact Round Complexity of Self-Composable Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2017}, url = {http://eprint.iacr.org/2017/124}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMM17, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, title = {Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2017}, url = {http://eprint.iacr.org/2017/541}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMM17a, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, title = {When does Functional Encryption Imply Obfuscation?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {943}, year = {2017}, url = {http://eprint.iacr.org/2017/943}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMMM17, author = {Sanjam Garg and Mohammad Mahmoody and Daniel Masny and Izaak Meckler}, title = {On the Round Complexity of {OT} Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1187}, year = {2017}, url = {http://eprint.iacr.org/2017/1187}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargS17, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {Garbled Protocols and Two-Round {MPC} from Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1004}, year = {2017}, url = {http://eprint.iacr.org/2017/1004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargS17a, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {Two-Round Multiparty Secure Computation from Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1156}, year = {2017}, url = {http://eprint.iacr.org/2017/1156}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargYZ17, author = {Sumegha Garg and Henry Yuen and Mark Zhandry}, title = {New security notions and feasibility results for authentication of quantum data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2017}, url = {http://eprint.iacr.org/2017/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GayHK17, author = {Romain Gay and Dennis Hofheinz and Lisa Kohl}, title = {Kurosawa-Desmedt Meets Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2017}, url = {http://eprint.iacr.org/2017/525}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GayHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziPR17, author = {Peter Gazi and Krzysztof Pietrzak and Michal Ryb{\'{a}}r}, title = {The Exact Security of {PMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2017}, url = {http://eprint.iacr.org/2017/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GelinW17, author = {Alexandre G{\'{e}}lin and Benjamin Wesolowski}, title = {Loop-abort faults on supersingular isogeny cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2017}, url = {http://eprint.iacr.org/2017/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GelinW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GencIR17, author = {Ziya Alper Gen{\c{c}} and Vincenzo Iovino and Alfredo Rial}, title = {"The Simplest Protocol for Oblivious Transfer" Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2017}, url = {http://eprint.iacr.org/2017/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GencIR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeniseM17, author = {Nicholas Genise and Daniele Micciancio}, title = {Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2017}, url = {http://eprint.iacr.org/2017/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeniseM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIW17, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, title = {How to Construct a Leakage-Resilient (Stateless) Trusted Party}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {926}, year = {2017}, url = {http://eprint.iacr.org/2017/926}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinVY17, author = {Daniel Genkin and Luke Valenta and Yuval Yarom}, title = {May the Fourth Be With You: {A} Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {806}, year = {2017}, url = {http://eprint.iacr.org/2017/806}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinVY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeorgescuPST17, author = {Carmina Georgescu and Alina Petrescu{-}Nita and Emil Simion and Antonela Toma}, title = {{NIST} Randomness Tests (in)dependence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2017}, url = {http://eprint.iacr.org/2017/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeorgescuPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudNR17, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache and Razvan Rosie}, title = {Twisting Lattice and Graph Techniques to Compress Transactional Ledgers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2017}, url = {http://eprint.iacr.org/2017/751}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraudNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraultLMS17, author = {David G{\'{e}}rault and Pascal Lafourcade and Marine Minier and Christine Solnon}, title = {Revisiting {AES} Related-Key Differential Attacks with Constraint Programming}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2017}, url = {http://eprint.iacr.org/2017/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraultLMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ghadafi17, author = {Essam Ghadafi}, title = {Efficient Round-Optimal Blind Signatures in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2017}, url = {http://eprint.iacr.org/2017/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ghadafi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ghadafi17a, author = {Essam Ghadafi}, title = {How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2017}, url = {http://eprint.iacr.org/2017/902}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ghadafi17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhadafiG17, author = {Essam Ghadafi and Jens Groth}, title = {Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2017}, url = {http://eprint.iacr.org/2017/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhadafiG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhafariH17, author = {Vahid Amin Ghafari and Honggang Hu}, title = {A new chosen {IV} statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1103}, year = {2017}, url = {http://eprint.iacr.org/2017/1103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhafariH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhafariHa17, author = {Vahid Amin Ghafari and Honggang Hu and Mohammadsadegh alizadeh}, title = {Necessary conditions for designing secure stream ciphers with the minimal internal states}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2017}, url = {http://eprint.iacr.org/2017/765}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhafariHa17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GharahiK17, author = {Motahhareh Gharahi and Shahram Khazaei}, title = {Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1232}, year = {2017}, url = {http://eprint.iacr.org/2017/1232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GharahiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ghosal17, author = {Riddhi Ghosal}, title = {Analysing Relations involving small number of Monomials in {AES} {S-} Box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2017}, url = {http://eprint.iacr.org/2017/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ghosal17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshN17, author = {Satrajit Ghosh and Tobias Nilges}, title = {An Algebraic Approach to Maliciously Secure Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1064}, year = {2017}, url = {http://eprint.iacr.org/2017/1064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshNN17, author = {Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges}, title = {Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2017}, url = {http://eprint.iacr.org/2017/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshalC17, author = {Ashrujit Ghoshal and Thomas De Cnudde}, title = {Several Masked Implementations of the Boyar-Peralta {AES} S-Box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2017}, url = {http://eprint.iacr.org/2017/1023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshalC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiacomelliJJPY17, author = {Irene Giacomelli and Somesh Jha and Marc Joye and C. David Page and Kyonghwan Yoon}, title = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2017}, url = {http://eprint.iacr.org/2017/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiacomelliJJPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiacomelliJPY17, author = {Irene Giacomelli and Somesh Jha and C. David Page and Kyonghwan Yoon}, title = {Privacy-Preserving Ridge Regression on Distributed Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2017}, url = {http://eprint.iacr.org/2017/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiacomelliJPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiaconKP17, author = {Federico Giacon and Eike Kiltz and Bertram Poettering}, title = {Hybrid Encryption in a Multi-User Setting, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {843}, year = {2017}, url = {http://eprint.iacr.org/2017/843}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiaconKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiladHMVZ17, author = {Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich}, title = {Algorand: Scaling Byzantine Agreements for Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2017}, url = {http://eprint.iacr.org/2017/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiladHMVZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiraudABL17, author = {Matthieu Giraud and Alexandre Anzala{-}Yamajako and Olivier Bernard and Pascal Lafourcade}, title = {Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2017}, url = {http://eprint.iacr.org/2017/046}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiraudABL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GjosteenS17, author = {Kristian Gj{\o}steen and Martin Strand}, title = {A roadmap to fully homomorphic elections: Stronger security, better verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2017}, url = {http://eprint.iacr.org/2017/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GjosteenS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKW17, author = {Shafi Goldwasser and Saleet Klein and Daniel Wichs}, title = {The Edited Truth}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2017}, url = {http://eprint.iacr.org/2017/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gonzalez17, author = {Alonso Gonz{\'{a}}lez}, title = {A Ring Signature of size {\(\Theta\)}(sqrt[3]\{n\}) without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {905}, year = {2017}, url = {http://eprint.iacr.org/2017/905}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gonzalez17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GopfertVW17, author = {Florian G{\"{o}}pfert and Christine van Vredendaal and Thomas Wunderer}, title = {A Quantum Attack on {LWE} with Arbitrary Error Distribution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2017}, url = {http://eprint.iacr.org/2017/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GopfertVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorkeJAC17, author = {Christian A. Gorke and Christian Janson and Frederik Armknecht and Carlos Cid}, title = {Cloud Storage File Recoverability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2017}, url = {http://eprint.iacr.org/2017/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorkeJAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gorodilova17, author = {Anastasiya Gorodilova}, title = {On differential equivalence of {APN} functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {907}, year = {2017}, url = {http://eprint.iacr.org/2017/907}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gorodilova17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoudarziJR17, author = {Dahmun Goudarzi and Antoine Joux and Matthieu Rivain}, title = {How to Securely Compute with Noisy Leakage in Quasilinear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {929}, year = {2017}, url = {http://eprint.iacr.org/2017/929}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoudarziJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoudarziRVV17, author = {Dahmun Goudarzi and Matthieu Rivain and Damien Vergnaud and Srinivas Vivek}, title = {Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2017}, url = {http://eprint.iacr.org/2017/632}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GoudarziRVV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalG17, author = {Rishab Goyal and Vipul Goyal}, title = {Overcoming Cryptographic Impossibility Results using Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {935}, year = {2017}, url = {http://eprint.iacr.org/2017/935}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalHKW17, author = {Rishab Goyal and Susan Hohenberger and Venkata Koppula and Brent Waters}, title = {A Generic Approach to Constructing and Proving Verifiable Random Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2017}, url = {http://eprint.iacr.org/2017/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalHKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKRW17, author = {Rishab Goyal and Venkata Koppula and Andrew Russell and Brent Waters}, title = {Risky Traitor Tracing and New Differential Privacy Negative Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1117}, year = {2017}, url = {http://eprint.iacr.org/2017/1117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW17, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2017}, url = {http://eprint.iacr.org/2017/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW17a, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Separating {IND-CPA} and Circular Security for Unbounded Length Key Cycles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2017}, url = {http://eprint.iacr.org/2017/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW17b, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Lockable Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2017}, url = {http://eprint.iacr.org/2017/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrassiR17, author = {Lorenzo Grassi and Christian Rechberger}, title = {New Limits for {AES} Known-Key Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2017}, url = {http://eprint.iacr.org/2017/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrassiR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrassiRR17, author = {Lorenzo Grassi and Christian Rechberger and Sondre R{\o}njom}, title = {A New Structural-Differential Property of 5-Round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2017}, url = {http://eprint.iacr.org/2017/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrassiRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreveRFY17, author = {Bj{\o}rn M{\o}ller Greve and H{\aa}vard Raddum and Gunnar Fl{\o}ystad and {\O}yvind Ytrehus}, title = {Eliminating Variables in Boolean Equation Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1027}, year = {2017}, url = {http://eprint.iacr.org/2017/1027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreveRFY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossIB17, author = {Hannes Gro{\ss} and Rinat Iusupov and Roderick Bloem}, title = {Generic Low-Latency Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1223}, year = {2017}, url = {http://eprint.iacr.org/2017/1223}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GrossIB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossM17, author = {Hannes Gro{\ss} and Stefan Mangard}, title = {Reconciling d+1Masking in Hardware and Software}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2017}, url = {http://eprint.iacr.org/2017/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossSM17, author = {Hannes Gro{\ss} and David Schaffenrath and Stefan Mangard}, title = {Higher-Order Side-Channel Protected Implementations of Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2017}, url = {http://eprint.iacr.org/2017/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossoS17, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Masking Proofs are Tight (and How to Exploit it in Security Evaluations)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2017}, url = {http://eprint.iacr.org/2017/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrothM17, author = {Jens Groth and Mary Maller}, title = {Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2017}, url = {http://eprint.iacr.org/2017/540}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrothM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsLR17, author = {Paul Grubbs and Jiahui Lu and Thomas Ristenpart}, title = {Message Franking via Committing Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2017}, url = {http://eprint.iacr.org/2017/664}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsRS17, author = {Paul Grubbs and Thomas Ristenpart and Vitaly Shmatikov}, title = {Why Your Encrypted Database Is Not Secure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2017}, url = {http://eprint.iacr.org/2017/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsRY17, author = {Paul Grubbs and Thomas Ristenpart and Yuval Yarom}, title = {Modifying an Enciphering Scheme after Deployment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2017}, url = {http://eprint.iacr.org/2017/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsRY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu17, author = {Chunsheng Gu}, title = {Multilinear Maps Using a Variant of Ring-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2017}, url = {http://eprint.iacr.org/2017/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu17a, author = {Chunsheng Gu}, title = {Integer Version of Ring-LWE and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {641}, year = {2017}, url = {http://eprint.iacr.org/2017/641}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu17b, author = {Chunsheng Gu}, title = {Cryptanalysis of indistinguishability obfuscation using {GGH13} without ideals}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1159}, year = {2017}, url = {http://eprint.iacr.org/2017/1159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronL17, author = {Shay Gueron and Yehuda Lindell}, title = {Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2017}, url = {http://eprint.iacr.org/2017/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronLL17, author = {Shay Gueron and Adam Langley and Yehuda Lindell}, title = {{AES-GCM-SIV:} Specification and Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2017}, url = {http://eprint.iacr.org/2017/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronM17, author = {Shay Gueron and Nicky Mouha}, title = {SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2017}, url = {http://eprint.iacr.org/2017/645}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilhemSW17, author = {Cyprien de Saint Guilhem and Nigel P. Smart and Bogdan Warinschi}, title = {Generic Forward-Secure Key Agreement Without Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2017}, url = {http://eprint.iacr.org/2017/853}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilhemSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilleyL17, author = {Sylvain Guilley and Liran Lerman}, title = {Bivariate attacks and confusion coefficients}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2017}, url = {http://eprint.iacr.org/2017/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilleyL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GulmezogluES17, author = {Berk G{\"{u}}lmezoglu and Thomas Eisenbarth and Berk Sunar}, title = {Cache-Base Application Detection in the Cloud Using Machine Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2017}, url = {http://eprint.iacr.org/2017/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GulmezogluES17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuntherHJL17, author = {Felix G{\"{u}}nther and Britta Hale and Tibor Jager and Sebastian Lauer}, title = {0-RTT Key Exchange with Full Forward Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2017}, url = {http://eprint.iacr.org/2017/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuntherHJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuntherK017, author = {Daniel G{\"{u}}nther and {\'{A}}gnes Kiss and Thomas Schneider}, title = {More Efficient Universal Circuit Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {798}, year = {2017}, url = {http://eprint.iacr.org/2017/798}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuntherK017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuntherM17, author = {Felix G{\"{u}}nther and Sogol Mazaheri}, title = {A Formal Treatment of Multi-key Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2017}, url = {http://eprint.iacr.org/2017/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuntherM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoCSLYM17, author = {Fuchun Guo and Rongmao Chen and Willy Susilo and Jianchang Lai and Guomin Yang and Yi Mu}, title = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with {A} Counterexample}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2017}, url = {http://eprint.iacr.org/2017/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoCSLYM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoDCS17, author = {Wanfen Guo and Xiaolei Dong and Zhenfu Cao and Jiachen Shen}, title = {Efficient Attribute-Based Secure Keyword Search on the Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {782}, year = {2017}, url = {http://eprint.iacr.org/2017/782}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoDCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GurPRRS17, author = {Kamil Doruk G{\"{u}}r and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savas}, title = {Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2017}, url = {http://eprint.iacr.org/2017/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GurPRRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GurPRRSS17, author = {Kamil Doruk G{\"{u}}r and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Hadi Sajjadpour and Erkay Savas}, title = {Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1254}, year = {2017}, url = {http://eprint.iacr.org/2017/1254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GurPRRSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gvili17, author = {Yaron Gvili}, title = {How to Prove Megabytes (Per Second)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {846}, year = {2017}, url = {http://eprint.iacr.org/2017/846}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gvili17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaaseL17, author = {Bj{\"{o}}rn Haase and Beno{\^{\i}}t Labrique}, title = {Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2017}, url = {http://eprint.iacr.org/2017/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaaseL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaenniKLD17, author = {Rolf Haenni and Reto E. Koenig and Philipp Locher and Eric Dubuis}, title = {CHVote System Specification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2017}, url = {http://eprint.iacr.org/2017/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaenniKLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HafizH17, author = {Syed Mahbub Hafiz and Ryan Henry}, title = {Querying for Queries: Indexes of Queries for Efficient and Expressive {IT-PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {825}, year = {2017}, url = {http://eprint.iacr.org/2017/825}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HafizH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiK17, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2017}, url = {http://eprint.iacr.org/2017/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviHPV17, author = {Shai Halevi and Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Round-Optimal Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1056}, year = {2017}, url = {http://eprint.iacr.org/2017/1056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviHPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviHSS17, author = {Shai Halevi and Tzipora Halevi and Victor Shoup and Noah Stephens{-}Davidowitz}, title = {Implementing BP-Obfuscation Using Graph-Induced Encoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2017}, url = {http://eprint.iacr.org/2017/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviHSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviI0KSY17, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Ilan Komargodski and Amit Sahai and Eylon Yogev}, title = {Non-Interactive Multiparty Computation without Correlated Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2017}, url = {http://eprint.iacr.org/2017/871}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviI0KSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamann0M17, author = {Matthias Hamann and Matthias Krause and Willi Meier}, title = {A Note on Stream Ciphers that Continuously Use the {IV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1172}, year = {2017}, url = {http://eprint.iacr.org/2017/1172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamann0M17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamann0MZ17, author = {Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang}, title = {Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2017}, url = {http://eprint.iacr.org/2017/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamann0MZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamburg17, author = {Mike Hamburg}, title = {The {STROBE} protocol framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2017}, url = {http://eprint.iacr.org/2017/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamburg17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamburg17a, author = {Mike Hamburg}, title = {Cryptanalysis of 22 1/2 rounds of Gimli}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2017}, url = {http://eprint.iacr.org/2017/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamburg17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanL17, author = {Shuai Han and Shengli Liu}, title = {KDM-Secure Public-Key Encryption from Constant-Noise {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2017}, url = {http://eprint.iacr.org/2017/310}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaoCRS17, author = {Feng Hao and Dylan Clarke and Brian Randell and Siamak F. Shahandashti}, title = {Verifiable Classroom Voting in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2017}, url = {http://eprint.iacr.org/2017/056}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaoCRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hars17, author = {Laszlo Hars}, title = {Hardware Bit-Mixers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2017}, url = {http://eprint.iacr.org/2017/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hars17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hars17a, author = {Laszlo Hars}, title = {Information Security Applications of Bit-Mixers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2017}, url = {http://eprint.iacr.org/2017/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hars17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HartKMPPQ17, author = {Daniel Hart and DoHoon Kim and Giacomo Micheli and Guillermo Pascual{-}Perez and Christophe Petit and Yuxuan Quek}, title = {A Practical Cryptanalysis of WalnutDSA}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1160}, year = {2017}, url = {http://eprint.iacr.org/2017/1160}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HartKMPPQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hartung17, author = {Gunnar Hartung}, title = {Attacks on Secure Logging Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2017}, url = {http://eprint.iacr.org/2017/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hartung17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HartungK0KH17, author = {Gunnar Hartung and Bj{\"{o}}rn Kaidel and Alexander Koch and Jessica Koch and Dominik Hartmann}, title = {Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {949}, year = {2017}, url = {http://eprint.iacr.org/2017/949}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HartungK0KH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hashimoto17, author = {Yasufumi Hashimoto}, title = {On the security of HMFEv}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2017}, url = {http://eprint.iacr.org/2017/689}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hashimoto17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HauckL17, author = {Eduard Hauck and Julian Loss}, title = {Efficient and Universally Composable Protocols for Oblivious Transfer from the {CDH} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1011}, year = {2017}, url = {http://eprint.iacr.org/2017/1011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HauckL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HayashiK17, author = {Masahito Hayashi and Takeshi Koshiba}, title = {Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2017}, url = {http://eprint.iacr.org/2017/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HayashiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayIV17, author = {Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {947}, year = {2017}, url = {http://eprint.iacr.org/2017/947}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayPV17, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2017}, url = {http://eprint.iacr.org/2017/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazaySS17, author = {Carmit Hazay and Peter Scholl and Eduardo Soria{-}Vazquez}, title = {Low Cost Constant Round {MPC} Combining {BMR} and Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2017}, url = {http://eprint.iacr.org/2017/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazaySS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV17, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {Scalable Multi-Party Private Set-Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2017}, url = {http://eprint.iacr.org/2017/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hee17, author = {Juay Guan Hee}, title = {An Attempt to Cryptanalyze {A} Partially Known Cipher Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {589}, year = {2017}, url = {http://eprint.iacr.org/2017/589}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hee17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerbertF17, author = {Vincent Herbert and Caroline Fontaine}, title = {Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2017}, url = {http://eprint.iacr.org/2017/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerbertF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerderFDD17, author = {Charles Herder and Benjamin Fuller and Marten van Dijk and Srinivas Devadas}, title = {Public Key Cryptosystems with Noisy Secret Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2017}, url = {http://eprint.iacr.org/2017/210}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerderFDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Herold0KRR17, author = {Gottfried Herold and Max Hoffmann and Michael Kloo{\ss} and Carla R{\`{a}}fols and Andy Rupp}, title = {New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {802}, year = {2017}, url = {http://eprint.iacr.org/2017/802}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Herold0KRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeroldK17, author = {Gottfried Herold and Elena Kirshanova}, title = {Improved Algorithms for the Approximate k-List Problem in Euclidean Norm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2017}, url = {http://eprint.iacr.org/2017/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeroldK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeroldKL17, author = {Gottfried Herold and Elena Kirshanova and Thijs Laarhoven}, title = {Speed-ups and time-memory trade-offs for tuple lattice sieving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1228}, year = {2017}, url = {http://eprint.iacr.org/2017/1228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeroldKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Herranz17, author = {Javier Herranz}, title = {Attribute-Based Encryption Implies Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2017}, url = {http://eprint.iacr.org/2017/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Herranz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuserPGM17, author = {Annelie Heuser and Stjepan Picek and Sylvain Guilley and Nele Mentens}, title = {Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2017}, url = {http://eprint.iacr.org/2017/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuserPGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HilbertJLJ17, author = {Nicholas Hilbert and Christian S. Jensen and Dan Lin and Wei Jiang}, title = {UFace: Your Universal Password That No One Can See}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2017}, url = {http://eprint.iacr.org/2017/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HilbertJLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HiromasaK17, author = {Ryo Hiromasa and Yutaka Kawai}, title = {Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2017}, url = {http://eprint.iacr.org/2017/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HiromasaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HiroseSY17, author = {Shoichi Hirose and Yu Sasaki and Kan Yasuda}, title = {Message-Recovery MACs and Verification-Unskippable {AE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2017}, url = {http://eprint.iacr.org/2017/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HiroseSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangOHY17, author = {Thang Hoang and Ceyhun D. Ozkaptan and Gabriel Hackebeil and Attila A. Yavuz}, title = {Efficient Oblivious Data Structures for Database Services on the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1238}, year = {2017}, url = {http://eprint.iacr.org/2017/1238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangOHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangOYGN17, author = {Thang Hoang and Ceyhun D. Ozkaptan and Attila A. Yavuz and Jorge Guajardo and Tam Nguyen}, title = {{S3ORAM:} {A} Computation-Efficient and Constant Client Bandwidth Blowup {ORAM} with Shamir Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2017}, url = {http://eprint.iacr.org/2017/819}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangOYGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangT17, author = {Viet Tung Hoang and Stefano Tessaro}, title = {The Multi-User Security of Double Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2017}, url = {http://eprint.iacr.org/2017/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangYDG17, author = {Thang Hoang and Attila A. Yavuz and F. Bet{\"{u}}l Durak and Jorge Guajardo}, title = {Oblivious Dynamic Searchable Encryption via Distributed {PIR} and {ORAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1158}, year = {2017}, url = {http://eprint.iacr.org/2017/1158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangYDG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangYG17, author = {Thang Hoang and Attila A. Yavuz and Jorge Guajardo}, title = {A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1237}, year = {2017}, url = {http://eprint.iacr.org/2017/1237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangYG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinPWZ17, author = {Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang}, title = {A signature scheme from Learning with Truncation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {995}, year = {2017}, url = {http://eprint.iacr.org/2017/995}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinPWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzHK17, author = {Dennis Hofheinz and Kathrin H{\"{o}}velmanns and Eike Kiltz}, title = {A Modular Analysis of the Fujisaki-Okamoto Transformation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2017}, url = {http://eprint.iacr.org/2017/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HolmgrenY17, author = {Justin Holmgren and Lisa Yang}, title = {{(A} Counterexample to) Parallel Repetition for Non-Signaling Multi-Player Games}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1138}, year = {2017}, url = {http://eprint.iacr.org/2017/1138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HolmgrenY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HolzerW17, author = {Patrick Holzer and Thomas Wunderer}, title = {Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p\({}^{\mbox{{\(\alpha\)}}}\) q\({}^{\mbox{{\(\beta\)}}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2017}, url = {http://eprint.iacr.org/2017/513}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HolzerW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaS17, author = {Akinori Hosoyamada and Yu Sasaki}, title = {Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {977}, year = {2017}, url = {http://eprint.iacr.org/2017/977}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaS17a, author = {Akinori Hosoyamada and Yu Sasaki}, title = {Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1229}, year = {2017}, url = {http://eprint.iacr.org/2017/1229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaSX17, author = {Akinori Hosoyamada and Yu Sasaki and Keita Xagawa}, title = {Quantum Multicollision-Finding Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {864}, year = {2017}, url = {http://eprint.iacr.org/2017/864}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaSX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoweO17, author = {James Howe and M{\'{a}}ire O'Neill}, title = {{GLITCH:} {A} Discrete Gaussian Testing Suite For Lattice-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2017}, url = {http://eprint.iacr.org/2017/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoweO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuLT17, author = {Jiao Hu and Ruilin Li and Chaojing Tang}, title = {A Real-time Inversion Attack on the {GMR-2} Cipher Used in the Satellite Phones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2017}, url = {http://eprint.iacr.org/2017/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangH17, author = {Qiong Huang and Jianye Huang}, title = {Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {619}, year = {2017}, url = {http://eprint.iacr.org/2017/619}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hulsing0S17, author = {Andreas H{\"{u}}lsing and Tanja Lange and Kit Smeets}, title = {Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1025}, year = {2017}, url = {http://eprint.iacr.org/2017/1025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hulsing0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hulsing17, author = {Andreas H{\"{u}}lsing}, title = {{WOTS+} - Shorter Signatures for Hash-Based Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {965}, year = {2017}, url = {http://eprint.iacr.org/2017/965}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hulsing17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HulsingRB17, author = {Andreas H{\"{u}}lsing and Lea Rausch and Johannes Buchmann}, title = {Optimal Parameters for {XMSSMT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {966}, year = {2017}, url = {http://eprint.iacr.org/2017/966}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HulsingRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HulsingRSS17, author = {Andreas H{\"{u}}lsing and Joost Rijneveld and John M. Schanck and Peter Schwabe}, title = {High-speed key encapsulation from {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {667}, year = {2017}, url = {http://eprint.iacr.org/2017/667}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HulsingRSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hurley-SmithH17, author = {Darren Hurley{-}Smith and Julio Hernandez{-}Castro}, title = {Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {842}, year = {2017}, url = {http://eprint.iacr.org/2017/842}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hurley-SmithH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HutchinsonK17, author = {Aaron Hutchinson and Koray Karabina}, title = {Constructing Multidimensional Differential Addition Chains and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2017}, url = {http://eprint.iacr.org/2017/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HutchinsonK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ImmlerHLLW17, author = {Vincent Immler and Matthias Hiller and Qinzhi Liu and Andreas Lenz and Antonia Wachter{-}Zeh}, title = {Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {911}, year = {2017}, url = {http://eprint.iacr.org/2017/911}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ImmlerHLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ImmlerSU17, author = {Vincent Immler and Robert Specht and Florian Unterstein}, title = {Your Rails Cannot Hide From Localized {EM:} How Dual-Rail Logic Fails on FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {608}, year = {2017}, url = {http://eprint.iacr.org/2017/608}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ImmlerSU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InasawaY17, author = {Keita Inasawa and Kenji Yasunaga}, title = {Rational Proofs against Rational Verifiers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2017}, url = {http://eprint.iacr.org/2017/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InasawaY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonKNPSSSY17, author = {Mihaela Ion and Ben Kreuter and Erhan Nergiz and Sarvar Patel and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung}, title = {Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {738}, year = {2017}, url = {http://eprint.iacr.org/2017/738}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonKNPSSSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiW17, author = {Yuval Ishai and Mor Weiss}, title = {Probabilistically Checkable Proofs of Proximity with Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2017}, url = {http://eprint.iacr.org/2017/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeS17, author = {Takanori Isobe and Kyoji Shibutani}, title = {New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {868}, year = {2017}, url = {http://eprint.iacr.org/2017/868}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ItkisSVWY17, author = {Gene Itkis and Emily Shen and Mayank Varia and David Wilson and Arkady Yerukhimovich}, title = {Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2017}, url = {http://eprint.iacr.org/2017/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ItkisSVWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataMPS17, author = {Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin}, title = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2017}, url = {http://eprint.iacr.org/2017/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataS17, author = {Tetsu Iwata and Yannick Seurin}, title = {Reconsidering the Security Bound of {AES-GCM-SIV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2017}, url = {http://eprint.iacr.org/2017/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JacobHZRS17, author = {Nisha Jacob and Johann Heyszl and Andreas Zankl and Carsten Rolfes and Georg Sigl}, title = {How to Break Secure Boot on {FPGA} SoCs through Malicious Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2017}, url = {http://eprint.iacr.org/2017/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JacobHZRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JacommeKS17, author = {Charlie Jacomme and Steve Kremer and Guillaume Scerri}, title = {Symbolic Models for Isolated Execution Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2017}, url = {http://eprint.iacr.org/2017/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JacommeKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JafargholiKKKPW17, author = {Zahra Jafargholi and Chethan Kamath and Karen Klein and Ilan Komargodski and Krzysztof Pietrzak and Daniel Wichs}, title = {Be Adaptive, Avoid Overcommitting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2017}, url = {http://eprint.iacr.org/2017/515}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JafargholiKKKPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JafargholiSW17, author = {Zahra Jafargholi and Alessandra Scafuro and Daniel Wichs}, title = {Adaptively Indistinguishable Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {934}, year = {2017}, url = {http://eprint.iacr.org/2017/934}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JafargholiSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerK17, author = {Tibor Jager and Rafael Kurek}, title = {Continuous Collision Resistance and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2017}, url = {http://eprint.iacr.org/2017/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerSSW17, author = {Tibor Jager and Martijn Stam and Ryan Stanley{-}Oakes and Bogdan Warinschi}, title = {Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2017}, url = {http://eprint.iacr.org/2017/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainKKR17, author = {Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum}, title = {Distinguisher-Dependent Simulation in Two Rounds and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2017}, url = {http://eprint.iacr.org/2017/330}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainKKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainRS17, author = {Aayush Jain and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2017}, url = {http://eprint.iacr.org/2017/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JamshidpourA17, author = {Sadegh Jamshidpour and Zahra Ahmadian}, title = {Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1099}, year = {2017}, url = {http://eprint.iacr.org/2017/1099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JamshidpourA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKKX17, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu}, title = {{TOPPSS:} Cost-minimal Password-Protected Secret Sharing based on Threshold {OPRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2017}, url = {http://eprint.iacr.org/2017/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKKX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaschkeA17, author = {Angela J{\"{a}}schke and Frederik Armknecht}, title = {(Finite) Field Work: Choosing the Best Encoding of Numbers for {FHE} Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2017}, url = {http://eprint.iacr.org/2017/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaschkeA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaschkeGAS17, author = {Angela J{\"{a}}schke and Bj{\"{o}}rn Grohmann and Frederik Armknecht and Andreas Schaad}, title = {Industrial Feasibility of Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2017}, url = {http://eprint.iacr.org/2017/813}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaschkeGAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanMPS17, author = {J{\'{e}}r{\'{e}}my Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich}, title = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2017}, url = {http://eprint.iacr.org/2017/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanPS17, author = {J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin and Siang Meng Sim}, title = {Optimizing Implementations of Lightweight Building Blocks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2017}, url = {http://eprint.iacr.org/2017/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JetchevW17, author = {Dimitar Jetchev and Benjamin Wesolowski}, title = {Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2017}, url = {http://eprint.iacr.org/2017/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JetchevW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhaLMMN17, author = {Ashwin Jha and Eik List and Kazuhiko Minematsu and Sweta Mishra and Mridul Nandi}, title = {{XHX} - {A} Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1075}, year = {2017}, url = {http://eprint.iacr.org/2017/1075}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JhaLMMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhaMN17, author = {Ashwin Jha and Avradip Mandal and Mridul Nandi}, title = {On The Exact Security of Message Authentication Using Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2017}, url = {http://eprint.iacr.org/2017/172}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JhaMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiaTMGSL17, author = {Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang}, title = {Robust Synchronous {P2P} Primitives Using {SGX} Enclaves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2017}, url = {http://eprint.iacr.org/2017/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiaTMGSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangZCWM17, author = {Haodong Jiang and Zhenfeng Zhang and Long Chen and Hong Wang and Zhi Ma}, title = {Post-quantum IND-CCA-secure {KEM} without Additional Hash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1096}, year = {2017}, url = {http://eprint.iacr.org/2017/1096}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangZCWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinZ17, author = {Zhengzhong Jin and Yunlei Zhao}, title = {Optimal Key Consensus in Presence of Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1058}, year = {2017}, url = {http://eprint.iacr.org/2017/1058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Johnston17, author = {Anna Johnston}, title = {Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2017}, url = {http://eprint.iacr.org/2017/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Johnston17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Johnston17a, author = {Anna Johnston}, title = {Dispersed Cryptography and the Quotient Ring Transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2017}, url = {http://eprint.iacr.org/2017/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Johnston17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JostM17, author = {Daniel Jost and Ueli Maurer}, title = {Context-Restricted Indifferentiability: Generalizing {UCE} and Implications on the Soundness of Hash-Function Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2017}, url = {http://eprint.iacr.org/2017/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JostM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JostMR17, author = {Daniel Jost and Ueli Maurer and Jo{\~{a}}o L. Ribeiro}, title = {Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1130}, year = {2017}, url = {http://eprint.iacr.org/2017/1130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JostMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JournaultS17, author = {Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Very High Order Masking: Efficient Implementation and Security Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2017}, url = {http://eprint.iacr.org/2017/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JournaultS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxV17, author = {Antoine Joux and Vanessa Vitse}, title = {A crossbred algorithm for solving Boolean polynomial systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2017}, url = {http://eprint.iacr.org/2017/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joye17, author = {Marc Joye}, title = {Privacy-Preserving Ridge Regression Without Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {732}, year = {2017}, url = {http://eprint.iacr.org/2017/732}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joye17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JudmayerZSVW17, author = {Aljosha Judmayer and Alexei Zamyatin and Nicholas Stifter and Artemios G. Voyiatzis and Edgar R. Weippl}, title = {Merged Mining: Curse of Cure?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {791}, year = {2017}, url = {http://eprint.iacr.org/2017/791}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JudmayerZSVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JutlaR17, author = {Charanjit S. Jutla and Arnab Roy}, title = {Improved Structure Preserving Signatures under Standard Bilinear Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2017}, url = {http://eprint.iacr.org/2017/025}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JutlaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KachigarT17, author = {Ghazal Kachigar and Jean{-}Pierre Tillich}, title = {Quantum Information Set Decoding Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2017}, url = {http://eprint.iacr.org/2017/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KachigarT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KacsmarPH17, author = {Bailey Kacsmar and Sarah Plosker and Ryan Henry}, title = {Computing Low-Weight Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2017}, url = {http://eprint.iacr.org/2017/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KacsmarPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KajitaOF17, author = {Kaisei Kajita and Kazuto Ogawa and Eiichiro Fujisaki}, title = {A Constant-Size Signature Scheme with a Tighter Reduction from the {CDH} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1116}, year = {2017}, url = {http://eprint.iacr.org/2017/1116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KajitaOF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalesEM17, author = {Daniel Kales and Maria Eichlseder and Florian Mendel}, title = {Note on the Robustness of {CAESAR} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1137}, year = {2017}, url = {http://eprint.iacr.org/2017/1137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalesEM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kaliski17, author = {Burton S. Kaliski Jr.}, title = {A Quantum "Magic Box" for the Discrete Logarithm Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {745}, year = {2017}, url = {http://eprint.iacr.org/2017/745}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kaliski17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamalI17, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, title = {Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n{\textless}2k-1 (full paper)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2017}, url = {http://eprint.iacr.org/2017/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamalI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamaraM17, author = {Seny Kamara and Tarik Moataz}, title = {Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2017}, url = {http://eprint.iacr.org/2017/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamaraM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kaminsky17, author = {Alan Kaminsky}, title = {ElsieFour: {A} Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2017}, url = {http://eprint.iacr.org/2017/339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kaminsky17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KampanakisF17, author = {Panos Kampanakis and Scott R. Fluhrer}, title = {{LMS} vs {XMSS:} {A} comparison of the Stateful Hash-Based Signature Proposed Standards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2017}, url = {http://eprint.iacr.org/2017/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KampanakisF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KansalDM17, author = {Meenakshi Kansal and Ratna Dutta and Sourav Mukhopadhyay}, title = {Forward Secure Efficient Group Signature in Dynamic Setting using Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1128}, year = {2017}, url = {http://eprint.iacr.org/2017/1128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KansalDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiOS17, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Four-state Non-malleable Codes with Explicit Constant Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {930}, year = {2017}, url = {http://eprint.iacr.org/2017/930}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiOS17a, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Non-malleable Randomness Encoders and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1097}, year = {2017}, url = {http://eprint.iacr.org/2017/1097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiOS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaptchukMG17, author = {Gabriel Kaptchuk and Ian Miers and Matthew Green}, title = {Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2017}, url = {http://eprint.iacr.org/2017/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaptchukMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaratiS17, author = {Sabyasachi Karati and Palash Sarkar}, title = {Connecting Legendre with Kummer and Edwards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1205}, year = {2017}, url = {http://eprint.iacr.org/2017/1205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaratiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarimiDLG17, author = {Naghmeh Karimi and Jean{-}Luc Danger and Florent Lozach and Sylvain Guilley}, title = {Predictive Aging of Reliability of two Delay PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2017}, url = {http://eprint.iacr.org/2017/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarimiDLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kastner0WMHMS17, author = {Julia Kastner and Alexander Koch and Stefan Walzer and Daiki Miyahara and Yu{-}ichi Hayashi and Takaaki Mizuki and Hideaki Sone}, title = {The Minimum Number of Cards in Practical Card-based Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2017}, url = {http://eprint.iacr.org/2017/863}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Kastner0WMHMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Katsumata17, author = {Shuichi Katsumata}, title = {On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {808}, year = {2017}, url = {http://eprint.iacr.org/2017/808}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Katsumata17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzRW17, author = {Jonathan Katz and Samuel Ranellucci and Xiao Wang}, title = {Authenticated Garbling and Communication-Efficient, Constant-Round, Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2017}, url = {http://eprint.iacr.org/2017/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzRW17a, author = {Jonathan Katz and Samuel Ranellucci and Xiao Wang}, title = {Authenticated Garbling and Efficient Maliciously Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2017}, url = {http://eprint.iacr.org/2017/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzRW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KellerORSSV17, author = {Marcel Keller and Emmanuela Orsini and Dragos Rotaru and Peter Scholl and Eduardo Soria{-}Vazquez and Srinivas Vivek}, title = {Faster Secure Multi-Party Computation of {AES} and {DES} Using Lookup Tables}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2017}, url = {http://eprint.iacr.org/2017/378}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KellerORSSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KellerPR17, author = {Marcel Keller and Valerio Pastro and Dragos Rotaru}, title = {Overdrive: Making {SPDZ} Great Again}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1230}, year = {2017}, url = {http://eprint.iacr.org/2017/1230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KellerPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KellerRSW17, author = {Marcel Keller and Dragos Rotaru and Nigel P. Smart and Tim Wood}, title = {Reducing Communication Channels in {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2017}, url = {http://eprint.iacr.org/2017/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KellerRSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KellerY17, author = {Marcel Keller and Avishay Yanai}, title = {Efficient Maliciously Secure Multiparty Computation for {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {981}, year = {2017}, url = {http://eprint.iacr.org/2017/981}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KellerY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KempkaKS17, author = {Carmen Kempka and Ryo Kikuchi and Koutarou Suzuki}, title = {How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2017}, url = {http://eprint.iacr.org/2017/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KempkaKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhairallahCP17, author = {Mustafa Khairallah and Anupam Chattopadhyay and Thomas Peyrin}, title = {Looting the LUTs : {FPGA} Optimization of {AES} and AES-like Ciphers for Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1019}, year = {2017}, url = {http://eprint.iacr.org/2017/1019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhairallahCP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhalilG17, author = {Rami Khalil and Arthur Gervais}, title = {Revive: Rebalancing Off-Blockchain Payment Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2017}, url = {http://eprint.iacr.org/2017/823}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhalilG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhandakerNGDNK17, author = {Md. Al{-}Amin Khandaker and Yuki Nanjo and Loubna Ghammam and Sylvain Duquesne and Yasuyuki Nogami and Yuta Kodera}, title = {Efficient Optimal Ate Pairing at 128-bit Security Level}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1174}, year = {2017}, url = {http://eprint.iacr.org/2017/1174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhandakerNGDNK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhanookiSP17, author = {Hossein Arabnezhad{-}Khanoki and Babak Sadeghiyan and Josef Pieprzyk}, title = {Algebraic Attack Efficiency versus S-box Representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2017}, url = {http://eprint.iacr.org/2017/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhanookiSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Khurana17, author = {Dakshita Khurana}, title = {Round Optimal Concurrent Non-Malleability from Polynomial Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {734}, year = {2017}, url = {http://eprint.iacr.org/2017/734}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Khurana17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaS17, author = {Dakshita Khurana and Amit Sahai}, title = {Two-Message Non-Malleable Commitments from Standard Sub-exponential Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2017}, url = {http://eprint.iacr.org/2017/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasLT17, author = {Aggelos Kiayias and Feng{-}Hao Liu and Yiannis Tselekounis}, title = {Practical Non-Malleable Codes from {\(\mathscr{l}\)}-more Extractable Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2017}, url = {http://eprint.iacr.org/2017/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasMZ17, author = {Aggelos Kiayias and Andrew Miller and Dionysis Zindros}, title = {Non-Interactive Proofs of Proof-of-Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2017}, url = {http://eprint.iacr.org/2017/963}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzL17, author = {Eike Kiltz and Julian Loss}, title = {The Algebraic Group Model and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2017}, url = {http://eprint.iacr.org/2017/620}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzLP17, author = {Eike Kiltz and Julian Loss and Jiaxin Pan}, title = {Tightly-Secure Signatures from Five-Move Identification Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2017}, url = {http://eprint.iacr.org/2017/870}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzLS17, author = {Eike Kiltz and Vadim Lyubashevsky and Christian Schaffner}, title = {A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {916}, year = {2017}, url = {http://eprint.iacr.org/2017/916}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimCKKH17, author = {Kwang Ho Kim and Junyop Choe and Song Yun Kim and Namsu Kim and Sekung Hong}, title = {Speeding up Elliptic Curve Scalar Multiplication without Precomputation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {669}, year = {2017}, url = {http://eprint.iacr.org/2017/669}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimCKKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimKHSH17, author = {Seojin Kim and HyungChul Kang and Deukjo Hong and Jaechul Sung and Seokhie Hong}, title = {Efficient Differential Trail Searching Algorithm for {ARX} Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2017}, url = {http://eprint.iacr.org/2017/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimKHSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimKS17, author = {Sungwook Kim and Jinsu Kim and Jae Hong Seo}, title = {A New Approach for Practical Function-Private Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2017}, url = {http://eprint.iacr.org/2017/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLLO17, author = {Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh}, title = {Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2017}, url = {http://eprint.iacr.org/2017/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLLO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimW17, author = {Sam Kim and David J. Wu}, title = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2017}, url = {http://eprint.iacr.org/2017/380}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimW17a, author = {Sam Kim and David J. Wu}, title = {Access Control Encryption for General Policies from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2017}, url = {http://eprint.iacr.org/2017/467}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimY17, author = {Joo{-}Im Kim and Ji Won Yoon}, title = {Honey Chatting: {A} novel instant messaging system robust to eavesdropping over communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2017}, url = {http://eprint.iacr.org/2017/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KissLSAP17, author = {{\'{A}}gnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas}, title = {Private Set Intersection for Unequal Set Sizes with Mobile Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2017}, url = {http://eprint.iacr.org/2017/670}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KissLSAP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT17, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2017}, url = {http://eprint.iacr.org/2017/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT17a, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2017}, url = {http://eprint.iacr.org/2017/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT17b, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {638}, year = {2017}, url = {http://eprint.iacr.org/2017/638}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaT17, author = {Fuyuki Kitagawa and Keisuke Tanaka}, title = {Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {987}, year = {2017}, url = {http://eprint.iacr.org/2017/987}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiyoshimaLV17, author = {Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam}, title = {A Unified Approach to Constructing Black-box {UC} Protocols in Trusted Setup Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {944}, year = {2017}, url = {http://eprint.iacr.org/2017/944}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiyoshimaLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KleinjungDLPS17, author = {Thorsten Kleinjung and Claus Diem and Arjen K. Lenstra and Christine Priplata and Colin Stahlke}, title = {Computation of a 768-bit prime field discrete logarithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2017}, url = {http://eprint.iacr.org/2017/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KleinjungDLPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Koc17, author = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {A New Algorithm for Inversion mod p\({}^{\mbox{k}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2017}, url = {http://eprint.iacr.org/2017/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Koc17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kohel17, author = {David Kohel}, title = {Twisted {\(\mu\)}\({}_{\mbox{4}}\)-normal form for elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2017}, url = {http://eprint.iacr.org/2017/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kohel17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kokoris-KogiasJ17, author = {Eleftherios Kokoris{-}Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Bryan Ford}, title = {OmniLedger: {A} Secure, Scale-Out, Decentralized Ledger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2017}, url = {http://eprint.iacr.org/2017/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kokoris-KogiasJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kolbl17, author = {Stefan K{\"{o}}lbl}, title = {Putting Wings on {SPHINCS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {898}, year = {2017}, url = {http://eprint.iacr.org/2017/898}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kolbl17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovMPRT17, author = {Vladimir Kolesnikov and Naor Matania and Benny Pinkas and Mike Rosulek and Ni Trieu}, title = {Practical Multi-party Private Set Intersection from Symmetric-Key Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {799}, year = {2017}, url = {http://eprint.iacr.org/2017/799}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovMPRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovNRTT17, author = {Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti}, title = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2017}, url = {http://eprint.iacr.org/2017/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovNRTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovRT17, author = {Vladimir Kolesnikov and Mike Rosulek and Ni Trieu}, title = {SWiM: Secure Wildcard Pattern Matching From {OT} Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1150}, year = {2017}, url = {http://eprint.iacr.org/2017/1150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiNY17, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2017}, url = {http://eprint.iacr.org/2017/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiP17, author = {Ilan Komargodski and Anat Paskin{-}Cherniavsky}, title = {Evolving Secret Sharing: Dynamic Thresholds and Robustness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {948}, year = {2017}, url = {http://eprint.iacr.org/2017/948}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiS17, author = {Ilan Komargodski and Gil Segev}, title = {From Minicrypt to Obfustopia via Private-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2017}, url = {http://eprint.iacr.org/2017/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KondiP17, author = {Yashvanth Kondi and Arpita Patra}, title = {Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2017}, url = {http://eprint.iacr.org/2017/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KondiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppermannSHS17, author = {Philipp Koppermann and Fabrizio De Santis and Johann Heyszl and Georg Sigl}, title = {Fast {FPGA} Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {814}, year = {2017}, url = {http://eprint.iacr.org/2017/814}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppermannSHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaPW17, author = {Venkata Koppula and Andrew Poelstra and Brent Waters}, title = {Universal Samplers with Fast Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2017}, url = {http://eprint.iacr.org/2017/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KornaropoulosE17, author = {Evgenios M. Kornaropoulos and Petros Efstathopoulos}, title = {Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {850}, year = {2017}, url = {http://eprint.iacr.org/2017/850}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KornaropoulosE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KowalczykMUW17, author = {Lucas Kowalczyk and Tal Malkin and Jonathan R. Ullman and Daniel Wichs}, title = {Hardness of Non-Interactive Differential Privacy from One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1107}, year = {2017}, url = {http://eprint.iacr.org/2017/1107}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KowalczykMUW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KranzLSW17, author = {Thorsten Kranz and Gregor Leander and Ko Stoffelen and Friedrich Wiemer}, title = {Shorter Linear Straight-Line Programs for {MDS} Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1151}, year = {2017}, url = {http://eprint.iacr.org/2017/1151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KranzLSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KranzWL17, author = {Thorsten Kranz and Friedrich Wiemer and Gregor Leander}, title = {Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2017}, url = {http://eprint.iacr.org/2017/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KranzWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Krause17, author = {Matthias Krause}, title = {On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2017}, url = {http://eprint.iacr.org/2017/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Krause17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KubjasPW17, author = {Ivo Kubjas and Tiit Pikma and Jan Willemson}, title = {Estonian Voting Verification Mechanism Revisited Again}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2017}, url = {http://eprint.iacr.org/2017/081}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KubjasPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarFTS17, author = {Amrit Kumar and Cl{\'{e}}ment Fischer and Shruti Tople and Prateek Saxena}, title = {A Traceability Analysis of Monero's Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2017}, url = {http://eprint.iacr.org/2017/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarFTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarHKC17, author = {Sachin Kumar and Jawad Haj{-}Yihia and Mustafa Khairallah and Anupam Chattopadhyay}, title = {A Comprehensive Performance Analysis of Hardware Implementations of {CAESAR} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1261}, year = {2017}, url = {http://eprint.iacr.org/2017/1261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarHKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarPBMBCB17, author = {S. V. Dilip Kumar and Sikhar Patranabis and Jakub Breier and Debdeep Mukhopadhyay and Shivam Bhasin and Anupam Chattopadhyay and Anubhab Baksi}, title = {A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1074}, year = {2017}, url = {http://eprint.iacr.org/2017/1074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarPBMBCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarPW17, author = {Virendra Kumar and Jonathan Petit and William Whyte}, title = {Binary Hash Tree based Certificate Access Management}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2017}, url = {http://eprint.iacr.org/2017/744}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarRA17, author = {Rajendra Kumar and Mahesh Sreekumar Rajasree and Hoda Alkhzaimi}, title = {Cryptanalysis of 1-Round {KECCAK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1028}, year = {2017}, url = {http://eprint.iacr.org/2017/1028}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarRA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuoLCHPCY17, author = {Po{-}Chun Kuo and Wen{-}Ding Li and Yu{-}Wei Chen and Yuan{-}Che Hsu and Bo{-}Yuan Peng and Chen{-}Mou Cheng and Bo{-}Yin Yang}, title = {Post-Quantum Key Exchange on FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {690}, year = {2017}, url = {http://eprint.iacr.org/2017/690}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KuoLCHPCY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KushwahaM17, author = {Prabhat Kushwaha and Ayan Mahalanobis}, title = {A Probabilistic Baby-Step Giant-Step Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2017}, url = {http://eprint.iacr.org/2017/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KushwahaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersR17, author = {Ralf K{\"{u}}sters and Daniel Rausch}, title = {A Framework for Universally Composable Diffie-Hellman Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2017}, url = {http://eprint.iacr.org/2017/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kwant0T17, author = {Robin Kwant and Tanja Lange and Kimberley Thissen}, title = {Lattice Klepto: Turning Post-Quantum Crypto Against Itself}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1140}, year = {2017}, url = {http://eprint.iacr.org/2017/1140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kwant0T17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LacBCFS17, author = {Benjamin Lac and Marc Beunardeau and Anne Canteaut and Jacques Fournier and Renaud Sirdey}, title = {A First {DFA} on {PRIDE:} from Theory to Practice (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2017}, url = {http://eprint.iacr.org/2017/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LacBCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LacCFS17, author = {Benjamin Lac and Anne Canteaut and Jacques Fournier and Renaud Sirdey}, title = {{DFA} on LS-Designs with a Practical Implementation on {SCREAM} (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2017}, url = {http://eprint.iacr.org/2017/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LacCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LacCFS17a, author = {Benjamin Lac and Anne Canteaut and Jacques J. A. Fournier and Renaud Sirdey}, title = {Thwarting Fault Attacks using the Internal Redundancy Countermeasure {(IRC)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {910}, year = {2017}, url = {http://eprint.iacr.org/2017/910}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LacCFS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LachariteMP17, author = {Marie{-}Sarah Lacharit{\'{e}} and Brice Minaud and Kenneth G. Paterson}, title = {Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {701}, year = {2017}, url = {http://eprint.iacr.org/2017/701}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LachariteMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LachariteP17, author = {Marie{-}Sarah Lacharit{\'{e}} and Kenneth G. Paterson}, title = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1068}, year = {2017}, url = {http://eprint.iacr.org/2017/1068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LachariteP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LafranceM17, author = {Philip Lafrance and Alfred Menezes}, title = {On the security of the {WOTS-PRF} signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {938}, year = {2017}, url = {http://eprint.iacr.org/2017/938}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LafranceM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiC17, author = {Russell W. F. Lai and Sherman S. M. Chow}, title = {Forward-Secure Searchable Encryption on Labeled Bipartite Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2017}, url = {http://eprint.iacr.org/2017/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiZCS17, author = {Russell W. F. Lai and Tao Zhang and Sherman S. M. Chow and Dominique Schr{\"{o}}der}, title = {Efficient Sanitizable Signatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2017}, url = {http://eprint.iacr.org/2017/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiZCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaingS17, author = {Thalia M. Laing and Douglas R. Stinson}, title = {A Survey and Refinement of Repairable Threshold Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1155}, year = {2017}, url = {http://eprint.iacr.org/2017/1155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaingS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Laird17, author = {Paul Laird}, title = {On Two Round Rerunnable {MPC} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {912}, year = {2017}, url = {http://eprint.iacr.org/2017/912}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Laird17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LallemandR17, author = {Virginie Lallemand and Shahram Rasoolzadeh}, title = {Differential Cryptanalysis of 18-Round {PRIDE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1017}, year = {2017}, url = {http://eprint.iacr.org/2017/1017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LallemandR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LapetsVBJ17, author = {Andrei Lapets and Mayank Varia and Azer Bestavros and Frederick Jansen}, title = {Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {803}, year = {2017}, url = {http://eprint.iacr.org/2017/803}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LapetsVBJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterN17, author = {Kristin E. Lauter and Michael Naehrig}, title = {Cryptographic Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1108}, year = {2017}, url = {http://eprint.iacr.org/2017/1108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauterN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeanderM17, author = {Gregor Leander and Alexander May}, title = {Grover Meets Simon - Quantumly Attacking the FX-construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2017}, url = {http://eprint.iacr.org/2017/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeanderM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lee17, author = {Seungkwang Lee}, title = {A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2017}, url = {http://eprint.iacr.org/2017/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lee17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeermakersS17, author = {Daan Leermakers and Boris Skoric}, title = {Optimal attacks on qubit-based Quantum Key Recycling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2017}, url = {http://eprint.iacr.org/2017/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeermakersS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeermakersS17a, author = {Daan Leermakers and Boris Skoric}, title = {Security proof for Round Robin Differential Phase Shift {QKD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {830}, year = {2017}, url = {http://eprint.iacr.org/2017/830}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeermakersS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeibowitzPDH17, author = {Hemi Leibowitz and Ania M. Piotrowska and George Danezis and Amir Herzberg}, title = {No right to remain silent: Isolating Malicious Mixes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1000}, year = {2017}, url = {http://eprint.iacr.org/2017/1000}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeibowitzPDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lenstra17, author = {Arjen K. Lenstra}, title = {General purpose integer factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1087}, year = {2017}, url = {http://eprint.iacr.org/2017/1087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lenstra17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeontiadisL17, author = {Iraklis Leontiadis and Ming Li}, title = {Storage Efficient Substring Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2017}, url = {http://eprint.iacr.org/2017/153}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LeontiadisL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeslieSS17, author = {David S. Leslie and Chris Sherfield and Nigel P. Smart}, title = {Multi-Rate Threshold FlipThem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2017}, url = {http://eprint.iacr.org/2017/611}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeslieSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LevillainTV17, author = {Olivier Levillain and Maxence Tury and Nicolas Vivet}, title = {concerto: {A} Methodology Towards Reproducible Analyses of {TLS} Datasets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2017}, url = {http://eprint.iacr.org/2017/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LevillainTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiAWW17, author = {Taotao Li and Parhat Abla and Mingsheng Wang and Qianwen Wei}, title = {Designing Proof of Transaction Puzzles for Cryptocurrency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1242}, year = {2017}, url = {http://eprint.iacr.org/2017/1242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiAWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiBDW17, author = {Zheng Li and Wenquan Bi and Xiaoyang Dong and Xiaoyun Wang}, title = {Improved Conditional Cube Attacks on Keccak Keyed Modes with {MILP} Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {804}, year = {2017}, url = {http://eprint.iacr.org/2017/804}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiBDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiDW17, author = {Zheng Li and Xiaoyang Dong and Xiaoyun Wang}, title = {Conditional Cube Attack on Round-Reduced {ASCON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2017}, url = {http://eprint.iacr.org/2017/160}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLPX17, author = {Haoyu Li and Renzhang Liu and Yanbin Pan and Tianyuan Xie}, title = {Cryptanalysis of {HK17}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1259}, year = {2017}, url = {http://eprint.iacr.org/2017/1259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLPX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLXY17, author = {Zhe Li and San Ling and Chaoping Xing and Sze Ling Yeo}, title = {On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1002}, year = {2017}, url = {http://eprint.iacr.org/2017/1002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiMCQ17, author = {Yin Li and Xingpo Ma and Qin Chen and Chuanda Qi}, title = {Efficient Square-based Montgomery Multiplier for All Type {C.1} Pentanomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {836}, year = {2017}, url = {http://eprint.iacr.org/2017/836}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiMCQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiPN17, author = {Hongda Li and Dongxue Pan and Peifang Ni}, title = {Augmented Black-Box Simulation and Zero Knowledge Argument for {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1243}, year = {2017}, url = {http://eprint.iacr.org/2017/1243}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiPN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiS17, author = {Yong Li and Sven Sch{\"{a}}ge}, title = {No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {818}, year = {2017}, url = {http://eprint.iacr.org/2017/818}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiTZ17, author = {Huige Li and Haibo Tian and Fangguo Zhang}, title = {Block Chain based Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2017}, url = {http://eprint.iacr.org/2017/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiW17, author = {Chaoyun Li and Qingju Wang}, title = {Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2017}, url = {http://eprint.iacr.org/2017/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiW17a, author = {Jing Li and Licheng Wang}, title = {Noiseless Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {839}, year = {2017}, url = {http://eprint.iacr.org/2017/839}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWYL17, author = {Ming Li and Jian Weng and Anjia Yang and Wei Lu}, title = {CrowdBC: {A} Blockchain-based Decentralized Framework for Crowdsourcing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2017}, url = {http://eprint.iacr.org/2017/444}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiXZ17, author = {Bao{-}Hong Li and Guoqing Xu and Yin{-}Liang Zhao}, title = {Attribute-based concurrent signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2017}, url = {http://eprint.iacr.org/2017/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiZL17, author = {Yin Li and Yu Zhang}, title = {Fast Montgomery-like Square Root Computation for All Trinomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2017}, url = {http://eprint.iacr.org/2017/064}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangM17, author = {Bei Liang and Aikaterini Mitrokotsa}, title = {Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {969}, year = {2017}, url = {http://eprint.iacr.org/2017/969}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangY17, author = {Min Liang and Li Yang}, title = {Block encryption of quantum messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1247}, year = {2017}, url = {http://eprint.iacr.org/2017/1247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiangY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertLNW17, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2017}, url = {http://eprint.iacr.org/2017/856}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertLNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertSSS17, author = {Beno{\^{\i}}t Libert and Amin Sakzad and Damien Stehl{\'{e}} and Ron Steinfeld}, title = {All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {876}, year = {2017}, url = {http://eprint.iacr.org/2017/876}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinPS17, author = {Huijia Lin and Rafael Pass and Pratik Soni}, title = {Two-Round Concurrent Non-Malleable Commitment from Time-Lock Puzzles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2017}, url = {http://eprint.iacr.org/2017/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinT17, author = {Huijia Lin and Stefano Tessaro}, title = {Indistinguishability Obfuscation from Bilinear Maps and Block-Wise Local PRGs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2017}, url = {http://eprint.iacr.org/2017/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lindell17, author = {Yehuda Lindell}, title = {Fast Secure Two-Party {ECDSA} Signing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2017}, url = {http://eprint.iacr.org/2017/552}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lindell17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellN17, author = {Yehuda Lindell and Ariel Nof}, title = {A Framework for Constructing Fast {MPC} over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {816}, year = {2017}, url = {http://eprint.iacr.org/2017/816}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellR17, author = {Yehuda Lindell and Tal Rabin}, title = {Secure Two-Party Computation with Fairness - {A} Necessary Design Principle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2017}, url = {http://eprint.iacr.org/2017/952}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellY17, author = {Yehuda Lindell and Avishay Yanai}, title = {Fast Garbling of Circuits over 3-Valued Logic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1225}, year = {2017}, url = {http://eprint.iacr.org/2017/1225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNWX17, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2017}, url = {http://eprint.iacr.org/2017/353}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa17, author = {Helger Lipmaa}, title = {Optimally Sound Sigma Protocols Under {DCRA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2017}, url = {http://eprint.iacr.org/2017/703}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaP17, author = {Helger Lipmaa and Kateryna Pavlyk}, title = {A Simpler Rate-Optimal {CPIR} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2017}, url = {http://eprint.iacr.org/2017/722}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Liskov17, author = {Moses D. Liskov}, title = {A practical, perfectly secure password scheme in the bounded retrieval model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {917}, year = {2017}, url = {http://eprint.iacr.org/2017/917}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Liskov17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LitosZ17, author = {Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros}, title = {Trust Is Risk: {A} Decentralized Financial Trust Platform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2017}, url = {http://eprint.iacr.org/2017/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LitosZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuDLA17, author = {Jian Liu and Li Duan and Yong Li and N. Asokan}, title = {Secure Deduplication of Encrypted Data: Refined Model and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2017}, url = {http://eprint.iacr.org/2017/1089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuDLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuJLA17, author = {Jian Liu and Mika Juuti and Yao Lu and N. Asokan}, title = {Oblivious Neural Network Predictions via MiniONN transformations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2017}, url = {http://eprint.iacr.org/2017/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuJLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuL17, author = {Fanbao Liu and Fengmei Liu}, title = {Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2017}, url = {http://eprint.iacr.org/2017/653}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuL17a, author = {Fanbao Liu and Fengmei Liu}, title = {Universal Forgery and Key Recovery Attacks: Application to FKS, {FKD} and Keyak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2017}, url = {http://eprint.iacr.org/2017/691}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLKN17, author = {Dongxi Liu and Nan Li and Jongkil Kim and Surya Nepal}, title = {Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {685}, year = {2017}, url = {http://eprint.iacr.org/2017/685}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLW0LX17, author = {Zheli Liu and Siyi Lv and Yu Wei and Jin Li and Joseph K. Liu and Yang Xiang}, title = {{FFSSE:} Flexible Forward Secure Searchable Encryption with Efficient Performance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1105}, year = {2017}, url = {http://eprint.iacr.org/2017/1105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLW0LX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLW17, author = {Zhengbin Liu and Yongqiang Li and Mingsheng Wang}, title = {Optimal Differential Trails in SIMON-like Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2017}, url = {http://eprint.iacr.org/2017/178}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLW17a, author = {Zhengbin Liu and Yongqiang Li and Mingsheng Wang}, title = {The Security of SIMON-like Ciphers Against Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {576}, year = {2017}, url = {http://eprint.iacr.org/2017/576}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuMW17, author = {Fukang Liu and Florian Mendel and Gaoli Wang}, title = {Collisions and Semi-Free-Start Collisions for Round-Reduced {RIPEMD-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {800}, year = {2017}, url = {http://eprint.iacr.org/2017/800}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuR17, author = {Yunwen Liu and Vincent Rijmen}, title = {New Observations on Invariant Subspace Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2017}, url = {http://eprint.iacr.org/2017/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuRDJ17, author = {Hanqing Liu and Na Ruan and Rongtian Du and Weijia Jia}, title = {On the Strategy and Behavior of Bitcoin Mining with N-attackers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1255}, year = {2017}, url = {http://eprint.iacr.org/2017/1255}, timestamp = {Tue, 24 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuRDJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuVW17, author = {Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee}, title = {New Protocols for Conditional Disclosure of Secrets (and More)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2017}, url = {http://eprint.iacr.org/2017/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuVW17a, author = {Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Towards Breaking the Exponential Barrier for General Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1062}, year = {2017}, url = {http://eprint.iacr.org/2017/1062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuVW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW17, author = {Yi Liu and Qi Wang}, title = {An E-voting Protocol Based on Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1043}, year = {2017}, url = {http://eprint.iacr.org/2017/1043}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWRA17, author = {Yunwen Liu and Glenn De Witte and Adri{\'{a}}n Ranea and Tomer Ashur}, title = {Rotational-XOR Cryptanalysis of Reduced-round {SPECK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1036}, year = {2017}, url = {http://eprint.iacr.org/2017/1036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWRA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZ17, author = {Qipeng Liu and Mark Zhandry}, title = {Exploding Obfuscation: {A} Framework for Building Applications of Obfuscation From Polynomial Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2017}, url = {http://eprint.iacr.org/2017/209}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Loidreau17, author = {Pierre Loidreau}, title = {A new rank metric codes based encryption scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2017}, url = {http://eprint.iacr.org/2017/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Loidreau17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Loken17, author = {Nils L{\"{o}}ken}, title = {Searchable Encryption with Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {679}, year = {2017}, url = {http://eprint.iacr.org/2017/679}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Loken17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LombardiV17, author = {Alex Lombardi and Vinod Vaikuntanathan}, title = {Minimizing the Complexity of Goldreich's Pseudorandom Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2017}, url = {http://eprint.iacr.org/2017/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LombardiV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LombardiV17a, author = {Alex Lombardi and Vinod Vaikuntanathan}, title = {On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2017}, url = {http://eprint.iacr.org/2017/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LombardiV17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LovettZ17, author = {Shachar Lovett and Jiapeng Zhang}, title = {On the impossibility of entropy reversal, and its application to zero-knowledge proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {922}, year = {2017}, url = {http://eprint.iacr.org/2017/922}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LovettZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lu17, author = {Yi Lu}, title = {New Linear Attacks on Block Cipher {GOST}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2017}, url = {http://eprint.iacr.org/2017/487}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoAFW17, author = {Pei Luo and Konstantinos Athanasiou and Yunsi Fei and Thomas Wahl}, title = {Algebraic Fault Analysis of {SHA-3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2017}, url = {http://eprint.iacr.org/2017/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoAFW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoFZD17, author = {Pei Luo and Yunsi Fei and Liwei Zhang and A. Adam Ding}, title = {Differential Fault Analysis of {SHA-3} under Relaxed Fault Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2017}, url = {http://eprint.iacr.org/2017/858}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoFZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL17, author = {Yiyuan Luo and Xuejia Lai}, title = {Improvements for Finding Impossible Differentials of Block Cipher Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1209}, year = {2017}, url = {http://eprint.iacr.org/2017/1209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuVTS17, author = {Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena}, title = {{SMART} {POOL} : Practical Decentralized Pooled Mining}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2017}, url = {http://eprint.iacr.org/2017/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuVTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxMP17, author = {Atul Luykx and Bart Mennink and Kenneth G. Paterson}, title = {Analyzing Multi-Key Security Degradation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2017}, url = {http://eprint.iacr.org/2017/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LyubashevskyN17, author = {Vadim Lyubashevsky and Gregory Neven}, title = {One-Shot Verifiable Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2017}, url = {http://eprint.iacr.org/2017/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LyubashevskyN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LyubashevskyS17, author = {Vadim Lyubashevsky and Gregor Seiler}, title = {Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2017}, url = {http://eprint.iacr.org/2017/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LyubashevskyS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaDHZX17, author = {Shunli Ma and Yi Deng and Debiao He and Jiang Zhang and Xiang Xie}, title = {An Efficient {NIZK} Scheme for Privacy-Preserving Transactions over Account-Model Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1239}, year = {2017}, url = {http://eprint.iacr.org/2017/1239}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaDHZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaZ17, author = {Fermi Ma and Mark Zhandry}, title = {Encryptor Combiners: {A} Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2017}, url = {http://eprint.iacr.org/2017/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaZ17a, author = {Fermi Ma and Mark Zhandry}, title = {New Multilinear Maps from {CLT13} with Provable Security Against Zeroizing Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {946}, year = {2017}, url = {http://eprint.iacr.org/2017/946}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Macario-RatP17, author = {Gilles Macario{-}Rat and Jacques Patarin}, title = {Two-Face: New Public Key Multivariate Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1210}, year = {2017}, url = {http://eprint.iacr.org/2017/1210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Macario-RatP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaffeiMRS17, author = {Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schr{\"{o}}der}, title = {Maliciously Secure Multi-Client {ORAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2017}, url = {http://eprint.iacr.org/2017/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaffeiMRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahloujifarM17, author = {Saeed Mahloujifar and Mohammad Mahmoody}, title = {Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {950}, year = {2017}, url = {http://eprint.iacr.org/2017/950}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahloujifarM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahriSBDW17, author = {Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon{-}Ho Wong}, title = {Fault Attacks on {XEX} Mode with Application to certain Authenticated Encryption Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {717}, year = {2017}, url = {http://eprint.iacr.org/2017/717}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahriSBDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaimutT17, author = {Diana Maimut and George Teseleanu}, title = {Secretly Embedding Trapdoors into Contract Signing Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2017}, url = {http://eprint.iacr.org/2017/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaimutT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraS17, author = {Subhamoy Maitra and Akhilesh Siddhanti}, title = {A Differential Fault Attack on Plantlet}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2017}, url = {http://eprint.iacr.org/2017/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraSSAG17, author = {Subhamoy Maitra and Nishant Sinha and Akhilesh Siddhanti and Ravi Anand and Sugata Gangopadhyay}, title = {A {TMDTO} Attack Against Lizard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {647}, year = {2017}, url = {http://eprint.iacr.org/2017/647}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraSSAG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MakriRSV17, author = {Eleftheria Makri and Dragos Rotaru and Nigel P. Smart and Frederik Vercauteren}, title = {{PICS:} Private Image Classification with {SVM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1190}, year = {2017}, url = {http://eprint.iacr.org/2017/1190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MakriRSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalavoltaMKMR17, author = {Giulio Malavolta and Pedro Moreno{-}Sanchez and Aniket Kate and Matteo Maffei and Srivatsan Ravi}, title = {Concurrency and Privacy with Payment-Channel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {820}, year = {2017}, url = {http://eprint.iacr.org/2017/820}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalavoltaMKMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalisaKKSC17, author = {Luka Malisa and Kari Kostiainen and Thomas Knell and David M. Sommer and Srdjan Capkun}, title = {Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {584}, year = {2017}, url = {http://eprint.iacr.org/2017/584}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalisaKKSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalMMR17, author = {Avradip Mandal and John C. Mitchell and Hart William Montgomery and Arnab Roy}, title = {Privacy for Targeted Advertising}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2017}, url = {http://eprint.iacr.org/2017/658}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalMMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MariotPLJ17, author = {Luca Mariot and Stjepan Picek and Alberto Leporati and Domagoj Jakobovic}, title = {Cellular Automata Based S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1055}, year = {2017}, url = {http://eprint.iacr.org/2017/1055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MariotPLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarohnWFRB17, author = {Byron Marohn and Charles V. Wright and Wu{-}chi Feng and Mike Rosulek and Rakesh B. Bobba}, title = {Approximate Thumbnail Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1046}, year = {2017}, url = {http://eprint.iacr.org/2017/1046}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarohnWFRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarsonP17, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {Security Notions for Bidirectional Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2017}, url = {http://eprint.iacr.org/2017/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarsonP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarsonP17a, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {With one it is easy, with many it gets complicated: Understanding Channel Security for Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {786}, year = {2017}, url = {http://eprint.iacr.org/2017/786}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarsonP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinMOS17, author = {Daniel P. Martin and Ashley Montanaro and Elisabeth Oswald and Dan J. Shepherd}, title = {Quantum Key Search with Side Channel Advice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2017}, url = {http://eprint.iacr.org/2017/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinMOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Masny17, author = {Daniel Masny}, title = {Authentication from Weak PRFs with Hidden Auxiliary Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {834}, year = {2017}, url = {http://eprint.iacr.org/2017/834}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Masny17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MateticAKDSGJC17, author = {Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David M. Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun}, title = {{ROTE:} Rollback Protection for Trusted Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2017}, url = {http://eprint.iacr.org/2017/048}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MateticAKDSGJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaximovS17, author = {Alexander Maximov and Helena Sjoberg}, title = {On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over {GF(2)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2017}, url = {http://eprint.iacr.org/2017/889}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaximovS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MazloomG17, author = {Sahar Mazloom and S. Dov Gordon}, title = {Differentially Private Access Patterns in Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1016}, year = {2017}, url = {http://eprint.iacr.org/2017/1016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MazloomG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCannO17, author = {David McCann and Elisabeth Oswald}, title = {Practical Evaluation of Masking Software Countermeasures on an IoT processor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2017}, url = {http://eprint.iacr.org/2017/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCannO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCarthySO17, author = {Sarah McCarthy and Neil Smyth and Elizabeth O'Sullivan}, title = {A Practical Implementation of Identity-Based Encryption over {NTRU} Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1049}, year = {2017}, url = {http://eprint.iacr.org/2017/1049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCarthySO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCorryHM17, author = {Patrick McCorry and Ethan Heilman and Andrew Miller}, title = {Atomically Trading with Roger: Gambling on the success of a hardfork}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2017}, url = {http://eprint.iacr.org/2017/694}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCorryHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCorrySH17, author = {Patrick McCorry and Siamak F. Shahandashti and Feng Hao}, title = {A Smart Contract for Boardroom Voting with Maximum Voter Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2017}, url = {http://eprint.iacr.org/2017/110}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCorrySH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McGuireM17, author = {Gary McGuire and Daniela M{\"{u}}ller}, title = {A few more index calculus algorithms for the {ECDLP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1262}, year = {2017}, url = {http://eprint.iacr.org/2017/1262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McGuireM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McKagueE17, author = {Matthew McKague and David M. Eyers}, title = {Anonymous contribution of data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2017}, url = {http://eprint.iacr.org/2017/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McKagueE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Meadows17, author = {Catherine Meadows}, title = {Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1152}, year = {2017}, url = {http://eprint.iacr.org/2017/1152}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Meadows17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeiklejohnM17, author = {Sarah Meiklejohn and Rebekah Mercer}, title = {M{\"{o}}bius: Trustless Tumbling for Transaction Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {881}, year = {2017}, url = {http://eprint.iacr.org/2017/881}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeiklejohnM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MellaDA17, author = {Silvia Mella and Joan Daemen and Gilles Van Assche}, title = {New techniques for trail bounds and application to differential trails in Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2017}, url = {http://eprint.iacr.org/2017/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MellaDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mennink17, author = {Bart Mennink}, title = {Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2017}, url = {http://eprint.iacr.org/2017/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mennink17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenninkN17, author = {Bart Mennink and Samuel Neves}, title = {Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2017}, url = {http://eprint.iacr.org/2017/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenninkN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenninkN17a, author = {Bart Mennink and Samuel Neves}, title = {Optimal PRFs from Blockcipher Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {812}, year = {2017}, url = {http://eprint.iacr.org/2017/812}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenninkN17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenninkS17, author = {Bart Mennink and Alan Szepieniec}, title = {{XOR} of PRPs in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2017}, url = {http://eprint.iacr.org/2017/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenninkS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeshkovCJ17, author = {Dmitry Meshkov and Alexander Chepurnoy and Marc Jansen}, title = {Revisiting Difficulty Control for Blockchain Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {731}, year = {2017}, url = {http://eprint.iacr.org/2017/731}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeshkovCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MessmerRAM17, author = {Sebastian Messmer and Jochen Rill and Dirk Achenbach and J{\"{o}}rn M{\"{u}}ller{-}Quade}, title = {A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {773}, year = {2017}, url = {http://eprint.iacr.org/2017/773}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MessmerRAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerRC17, author = {Michael Meyer and Steffen Reith and Fabio Campos}, title = {On hybrid {SIDH} schemes using Edwards and Montgomery curve arithmetic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1213}, year = {2017}, url = {http://eprint.iacr.org/2017/1213}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeyerRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicciancioW17, author = {Daniele Micciancio and Michael Walter}, title = {Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2017}, url = {http://eprint.iacr.org/2017/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicciancioW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MillerNV17, author = {Stephen D. Miller and Bhargav Narayanan and Ramarathnam Venkatesan}, title = {Coppersmith's lattices and "focus groups": an attack on small-exponent {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {835}, year = {2017}, url = {http://eprint.iacr.org/2017/835}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MillerNV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilnerCYR17, author = {Kevin Milner and Cas Cremers and Jiangshan Yu and Mark Ryan}, title = {Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2017}, url = {http://eprint.iacr.org/2017/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilnerCYR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilutinovicHWK17, author = {Mitar Milutinovic and Warren He and Howard Wu and Maxinder Kanwal}, title = {Proof of Luck: an Efficient Blockchain Consensus Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2017}, url = {http://eprint.iacr.org/2017/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilutinovicHWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinematsuI17, author = {Kazuhiko Minematsu and Tetsu Iwata}, title = {Cryptanalysis of PMACx, PMAC2x, and SIVx}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2017}, url = {http://eprint.iacr.org/2017/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinematsuI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MiracleY17, author = {Sarah Miracle and Scott Yilek}, title = {Cycle Slicer: An Algorithm for Building Permutations on Special Domains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {873}, year = {2017}, url = {http://eprint.iacr.org/2017/873}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MiracleY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MironovSS17, author = {Ilya Mironov and Gil Segev and Ido Shahaf}, title = {Strengthening the Security of Encrypted Databases: Non-Transitive JOINs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {883}, year = {2017}, url = {http://eprint.iacr.org/2017/883}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MironovSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MitrokotsaOPP17, author = {Aikaterini Mitrokotsa and Cristina Onete and Elena Pagnin and Mahesh Perera}, title = {Multi-Hop Distance Estimation: How Far are You?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2017}, url = {http://eprint.iacr.org/2017/705}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MitrokotsaOPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoghimiIE17, author = {Ahmad Moghimi and Gorka Irazoqui and Thomas Eisenbarth}, title = {CacheZoom: How {SGX} Amplifies The Power of Cache Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2017}, url = {http://eprint.iacr.org/2017/618}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoghimiIE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohamedP17, author = {Mohamed Saied Emam Mohamed and Albrecht Petzoldt}, title = {Efficient Multivariate Ring Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2017}, url = {http://eprint.iacr.org/2017/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohamedP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselR17, author = {Payman Mohassel and Mike Rosulek}, title = {Non-Interactive Secure 2PC in the Offline/Online and Batch Settings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2017}, url = {http://eprint.iacr.org/2017/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselRS17, author = {Payman Mohassel and Mike Rosulek and Alessandra Scafuro}, title = {Sublinear Zero-Knowledge Arguments for {RAM} Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2017}, url = {http://eprint.iacr.org/2017/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselZ17, author = {Payman Mohassel and Yupeng Zhang}, title = {SecureML: {A} System for Scalable Privacy-Preserving Machine Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2017}, url = {http://eprint.iacr.org/2017/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoodyPS17, author = {Dustin Moody and Ray A. Perlner and Daniel Smith{-}Tone}, title = {Improved Attacks for Characteristic-2 Parameters of the Cubic {ABC} Simple Matrix Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2017}, url = {http://eprint.iacr.org/2017/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoodyPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoosM17, author = {Thorben Moos and Amir Moradi}, title = {On the Easiness of Turning Higher-Order Leakages into First-Order}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2017}, url = {http://eprint.iacr.org/2017/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoosM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorganP17, author = {Danielle Morgan and Arnis Parsovs}, title = {Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {880}, year = {2017}, url = {http://eprint.iacr.org/2017/880}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorganP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MouhaRKK17, author = {Nicky Mouha and Mohammad S. Raunak and D. Richard Kuhn and Raghu Kacker}, title = {Finding Bugs in Cryptographic Hash Function Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {891}, year = {2017}, url = {http://eprint.iacr.org/2017/891}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MouhaRKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MourisTM17, author = {Dimitris Mouris and Nektarios Georgios Tsoutsos and Michail Maniatakos}, title = {TERMinator Suite: Benchmarking Privacy-Preserving Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1218}, year = {2017}, url = {http://eprint.iacr.org/2017/1218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MourisTM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Muehlemann17, author = {Anton Muehlemann}, title = {Sentiment Protocol: {A} Decentralized Protocol Leveraging Crowd Sourced Wisdom}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1133}, year = {2017}, url = {http://eprint.iacr.org/2017/1133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Muehlemann17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MurphyP17, author = {Sean Murphy and Rachel Player}, title = {Noise Distributions in Homomorphic Ring-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2017}, url = {http://eprint.iacr.org/2017/698}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MurphyP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MusaX17, author = {Saud Al Musa and Guangwu Xu}, title = {Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2017}, url = {http://eprint.iacr.org/2017/840}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MusaX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MyersS17, author = {Steven A. Myers and Adam Shull}, title = {Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {833}, year = {2017}, url = {http://eprint.iacr.org/2017/833}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MyersS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NachefMV17, author = {Val{\'{e}}rie Nachef and Nicolas Marri{\`{e}}re and Emmanuel Volte}, title = {Differential Attacks on {LILLIPUT} Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1121}, year = {2017}, url = {http://eprint.iacr.org/2017/1121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NachefMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naito17, author = {Yusuke Naito}, title = {Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2017}, url = {http://eprint.iacr.org/2017/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naito17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi17, author = {Mridul Nandi}, title = {Birthday Attack on Dual {EWCDM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2017}, url = {http://eprint.iacr.org/2017/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nargis17, author = {Isheeta Nargis}, title = {Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2017}, url = {http://eprint.iacr.org/2017/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nargis17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NascimentoC17, author = {Erick Nascimento and Lukasz Chmielewski}, title = {Horizontal Clustering Side-Channel Attacks on Embedded {ECC} Implementations (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1204}, year = {2017}, url = {http://eprint.iacr.org/2017/1204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NascimentoC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenSCM17, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay}, title = {Security Analysis of Arbiter {PUF} and Its Lightweight Compositions Under Predictability Test}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2017}, url = {http://eprint.iacr.org/2017/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenSCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenSJMD17, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Marten van Dijk}, title = {{MXPUF:} Secure {PUF} Design against State-of-the-art Modeling Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2017}, url = {http://eprint.iacr.org/2017/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenSJMD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenTW17, author = {Khoa Nguyen and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Zero-Knowledge Password Policy Check from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {854}, year = {2017}, url = {http://eprint.iacr.org/2017/854}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NiederhagenNY17, author = {Ruben Niederhagen and Kai{-}Chun Ning and Bo{-}Yin Yang}, title = {Implementing Joux-Vitse's Crossbred Algorithm for Solving {MQ} Systems over {GF(2)} on GPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1181}, year = {2017}, url = {http://eprint.iacr.org/2017/1181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NiederhagenNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nielsen17, author = {Jesper Buus Nielsen}, title = {Universally Composable Zero-Knowledge Proof of Membership}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2017}, url = {http://eprint.iacr.org/2017/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nielsen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikitinKJGGKCF17, author = {Kirill Nikitin and Eleftherios Kokoris{-}Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ismail Khoffi and Justin Cappos and Bryan Ford}, title = {{CHAINIAC:} Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2017}, url = {http://eprint.iacr.org/2017/648}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikitinKJGGKCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nikolic17, author = {Ivica Nikolic}, title = {How to Use Metaheuristics for Design of Symmetric-Key Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {851}, year = {2017}, url = {http://eprint.iacr.org/2017/851}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nikolic17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimuraNHMS17, author = {Akihiro Nishimura and Takuya Nishida and Yu{-}ichi Hayashi and Takaaki Mizuki and Hideaki Sone}, title = {Card-Based Protocols Using Unequal Division Shuffle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2017}, url = {http://eprint.iacr.org/2017/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimuraNHMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nojoumian17, author = {Mehrdad Nojoumian}, title = {Rational Trust Modeling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2017}, url = {http://eprint.iacr.org/2017/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nojoumian17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nyberg17, author = {Kaisa Nyberg}, title = {Statistical and Linear Independence of Binary Random Variables}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2017}, url = {http://eprint.iacr.org/2017/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nyberg17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ObremskiS17, author = {Maciej Obremski and Maciej Skorski}, title = {Inverted Leftover Hash Lemma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2017}, url = {http://eprint.iacr.org/2017/507}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ObremskiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ObremskiS17a, author = {Maciej Obremski and Maciej Skorski}, title = {Renyi Entropy Estimation Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2017}, url = {http://eprint.iacr.org/2017/588}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ObremskiS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OlafsdottirRC17, author = {Hildur {\'{O}}lafsd{\'{o}}ttir and Aanjhan Ranganathan and Srdjan Capkun}, title = {On the Security of Carrier Phase-based Ranging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2017}, url = {http://eprint.iacr.org/2017/591}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OlafsdottirRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OliveiraLR17, author = {Thomaz Oliveira and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {A note on how to (pre-)compute a ladder}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2017}, url = {http://eprint.iacr.org/2017/264}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OliveiraLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OliveiraLR17a, author = {Thomaz Oliveira and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {The Montgomery ladder on binary elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2017}, url = {http://eprint.iacr.org/2017/350}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OliveiraLR17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OlivierQ17, author = {Baptiste Olivier and Tony Quertier}, title = {Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {882}, year = {2017}, url = {http://eprint.iacr.org/2017/882}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OlivierQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrhonH17, author = {Neriman Gamze Orhon and H{\"{u}}seyin Hisil}, title = {Speeding up Huff Form of Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2017}, url = {http://eprint.iacr.org/2017/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrhonH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OuSWZ17, author = {Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou}, title = {Towards Optimal Pre-processing in Leakage Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {939}, year = {2017}, url = {http://eprint.iacr.org/2017/939}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/OuSWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OuSWZA17, author = {Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou and Juan Ai}, title = {Towards Easy Key Enumeration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2017}, url = {http://eprint.iacr.org/2017/254}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/OuSWZA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OuSWZC17, author = {Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou and Wei Cheng}, title = {Manifold Learning Towards Masking Implementations: {A} First Study}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1112}, year = {2017}, url = {http://eprint.iacr.org/2017/1112}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/OuSWZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OuWSZ17, author = {Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou}, title = {Profiling Good Leakage Models For Masked Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2017}, url = {http://eprint.iacr.org/2017/660}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/OuWSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzmenHY17, author = {Muslum Ozgur Ozmen and Thang Hoang and Attila A. Yavuz}, title = {Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1222}, year = {2017}, url = {http://eprint.iacr.org/2017/1222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OzmenHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzmenY17, author = {Muslum Ozgur Ozmen and Attila A. Yavuz}, title = {Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1039}, year = {2017}, url = {http://eprint.iacr.org/2017/1039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OzmenY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PagninM17, author = {Elena Pagnin and Aikaterini Mitrokotsa}, title = {Privacy-preserving biometric authentication: challenges and directions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2017}, url = {http://eprint.iacr.org/2017/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PagninM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PagninMT17, author = {Elena Pagnin and Aikaterini Mitrokotsa and Keisuke Tanaka}, title = {Anonymous Single-Round Server-Aided Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2017}, url = {http://eprint.iacr.org/2017/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PagninMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PakniatNE17, author = {Nasrollah Pakniat and Mahnaz Noroozi and Ziba Eslami}, title = {Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2017}, url = {http://eprint.iacr.org/2017/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PakniatNE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanethR17, author = {Omer Paneth and Guy N. Rothblum}, title = {On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {903}, year = {2017}, url = {http://eprint.iacr.org/2017/903}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanethR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapadopoulosWHN17, author = {Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan Vcel{\'{a}}k and Leonid Reyzin and Sharon Goldberg}, title = {Can {NSEC5} be practical for {DNSSEC} deployments?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2017}, url = {http://eprint.iacr.org/2017/099}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PapadopoulosWHN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Papagiannopoulos17, author = {Kostas Papagiannopoulos and Nikita Veshchikov}, title = {Mind the Gap: Towards Secure 1st-order Masking in Software}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2017}, url = {http://eprint.iacr.org/2017/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Papagiannopoulos17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParterY17, author = {Merav Parter and Eylon Yogev}, title = {Distributed Computing Made Secure: {A} New Cycle Cover Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1182}, year = {2017}, url = {http://eprint.iacr.org/2017/1182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParterY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Paskin-Cherniavsky17, author = {Anat Paskin{-}Cherniavsky and Slava Radune}, title = {Coding for interactive communication beyond threshold adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {672}, year = {2017}, url = {http://eprint.iacr.org/2017/672}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Paskin-Cherniavsky17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassS17, author = {Rafael Pass and Elaine Shi}, title = {Thunderella: Blockchains with Optimistic Instant Confirmation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {913}, year = {2017}, url = {http://eprint.iacr.org/2017/913}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatelPY17, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, title = {Recursive ORAMs with Practical Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {964}, year = {2017}, url = {http://eprint.iacr.org/2017/964}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatelPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatelPY17a, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, title = {Symmetric Searchable Encryption with Sharing and Unsharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {973}, year = {2017}, url = {http://eprint.iacr.org/2017/973}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatelPY17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisBMB17, author = {Sikhar Patranabis and Jakub Breier and Debdeep Mukhopadhyay and Shivam Bhasin}, title = {One Plus One is More than Two: {A} Practical Combination of Power and Fault Analysis Attacks on {PRESENT} and PRESENT-like Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1073}, year = {2017}, url = {http://eprint.iacr.org/2017/1073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisBMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisM17a, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Encrypt-Augment-Recover: Computationally Function Private Predicate Encryption in the Public-Key Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2017}, url = {http://eprint.iacr.org/2017/319}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisM17b, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2017}, url = {http://eprint.iacr.org/2017/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisM17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisM17c, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Lightweight Symmetric-Key Hidden Vector Encryption without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {796}, year = {2017}, url = {http://eprint.iacr.org/2017/796}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisM17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulR17, author = {Goutam Paul and Souvik Ray}, title = {Analysis of Burn-in period for {RC4} State Transition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2017}, url = {http://eprint.iacr.org/2017/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeetersHA17, author = {Roel Peeters and Jens Hermans and Aysajan Abidin}, title = {Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2017}, url = {http://eprint.iacr.org/2017/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeetersHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeikertRS17, author = {Chris Peikert and Oded Regev and Noah Stephens{-}Davidowitz}, title = {Pseudorandomness of Ring-LWE for Any Ring and Modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2017}, url = {http://eprint.iacr.org/2017/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeikertRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeikertS17, author = {Chris Peikert and Sina Shiehian}, title = {Privately Constraining and Programming PRFs, the {LWE} Way}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1094}, year = {2017}, url = {http://eprint.iacr.org/2017/1094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeikertS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Perez-SolaDNH17, author = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and Sergi Delgado{-}Segura and Guillermo Navarro{-}Arribas and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Double-spending Prevention for Bitcoin zero-confirmation transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2017}, url = {http://eprint.iacr.org/2017/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Perez-SolaDNH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PerilloC17, author = {Angelo Massimo Perillo and Emiliano De Cristofaro}, title = {{PAPEETE:} Private, Authorized, and Fast Personal Genomic Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {770}, year = {2017}, url = {http://eprint.iacr.org/2017/770}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PerilloC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PerrinPRR17, author = {L{\'{e}}o Perrin and Angela Promitzer and Sebastian Ramacher and Christian Rechberger}, title = {Improvements to the Linear Layer of LowMC: {A} Faster Picnic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1148}, year = {2017}, url = {http://eprint.iacr.org/2017/1148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PerrinPRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Persichetti17, author = {Edoardo Persichetti}, title = {Efficient Digital Signatures From Coding Theory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2017}, url = {http://eprint.iacr.org/2017/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Persichetti17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pessl17, author = {Peter Pessl}, title = {Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2017}, url = {http://eprint.iacr.org/2017/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pessl17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PesslBY17, author = {Peter Pessl and Leon Groot Bruinderink and Yuval Yarom}, title = {To {BLISS-B} or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2017}, url = {http://eprint.iacr.org/2017/490}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PesslBY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Petit17, author = {Christophe Petit}, title = {Faster Algorithms for Isogeny Problems using Torsion Point Images}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2017}, url = {http://eprint.iacr.org/2017/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Petit17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitL17, author = {Christophe Petit and Kristin E. Lauter}, title = {Hard and Easy Problems for Supersingular Isogeny Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {962}, year = {2017}, url = {http://eprint.iacr.org/2017/962}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Petzoldt17, author = {Albrecht Petzoldt}, title = {On the Complexity of the Hybrid Approach on HFEv-}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1135}, year = {2017}, url = {http://eprint.iacr.org/2017/1135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Petzoldt17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetzoldtSM17, author = {Albrecht Petzoldt and Alan Szepieniec and Mohamed Saied Emam Mohamed}, title = {A Practical Multivariate Blind Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2017}, url = {http://eprint.iacr.org/2017/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PetzoldtSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanBPMB17, author = {Quoc{-}Sang Phan and Lucas Bang and Corina S. Pasareanu and Pasquale Malacaria and Tevfik Bultan}, title = {Synthesis of Adaptive Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2017}, url = {http://eprint.iacr.org/2017/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanBPMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhongAHWM17, author = {Le Trieu Phong and Yoshinori Aono and Takuya Hayashi and Lihua Wang and Shiho Moriai}, title = {Privacy-Preserving Deep Learning via Additively Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {715}, year = {2017}, url = {http://eprint.iacr.org/2017/715}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhongAHWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHG17, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Template Attack vs Bayes Classifier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2017}, url = {http://eprint.iacr.org/2017/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHJBL17, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Lejla Batina and Axel Legay}, title = {The secrets of profiling for side-channel analysis: feature selection matters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2017}, url = {http://eprint.iacr.org/2017/1110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHJBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHJLK17, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Axel Legay and Karlo Knezevic}, title = {Profiled {SCA} with a New Twist: Semi-supervised Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1085}, year = {2017}, url = {http://eprint.iacr.org/2017/1085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHJLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinoL17, author = {Rafa{\"{e}}l Del Pino and Vadim Lyubashevsky}, title = {Amortization with Fewer Equations for Proving Knowledge of Small Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2017}, url = {http://eprint.iacr.org/2017/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinoLNS17, author = {Rafa{\"{e}}l del Pino and Vadim Lyubashevsky and Gregory Neven and Gregor Seiler}, title = {Practical Quantum-Safe Voting from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1235}, year = {2017}, url = {http://eprint.iacr.org/2017/1235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinoLNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoddebniakSSLR17, author = {Damian Poddebniak and Juraj Somorovsky and Sebastian Schinzel and Manfred Lochter and Paul R{\"{o}}sler}, title = {Attacking Deterministic Signature Schemes using Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1014}, year = {2017}, url = {http://eprint.iacr.org/2017/1014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoddebniakSSLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PointchevalS17, author = {David Pointcheval and Olivier Sanders}, title = {Reassessing Security of Randomizable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1197}, year = {2017}, url = {http://eprint.iacr.org/2017/1197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PointchevalS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PolyakovRSV17, author = {Yuriy Polyakov and Kurt Rohloff and Gyana Sahu and Vinod Vaikuntanathan}, title = {Fast Proxy Re-Encryption for Publish/Subscribe Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2017}, url = {http://eprint.iacr.org/2017/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PolyakovRSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Portmann17, author = {Christopher Portmann}, title = {Quantum Authentication with Key Recycling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2017}, url = {http://eprint.iacr.org/2017/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Portmann17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PotthastFLL17, author = {Martin Potthast and Christian Forler and Eik List and Stefan Lucks}, title = {Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2017}, url = {http://eprint.iacr.org/2017/158}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PotthastFLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PouliotGW17, author = {David Pouliot and Scott Griffy and Charles V. Wright}, title = {The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1098}, year = {2017}, url = {http://eprint.iacr.org/2017/1098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PouliotGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoussierZS17, author = {Romain Poussier and Yuanyuan Zhou and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A Systematic Approach to the Side-Channel Analysis of {ECC} Implementations with Worst-Case Horizontal Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2017}, url = {http://eprint.iacr.org/2017/629}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoussierZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Prest17, author = {Thomas Prest}, title = {Sharper Bounds in Lattice-Based Cryptography using the R{\'{e}}nyi Divergence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2017}, url = {http://eprint.iacr.org/2017/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Prest17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrimasPM17, author = {Robert Primas and Peter Pessl and Stefan Mangard}, title = {Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {594}, year = {2017}, url = {http://eprint.iacr.org/2017/594}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrimasPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PudduDC17, author = {Ivan Puddu and Alexandra Dmitrienko and Srdjan Capkun}, title = {{\(\mu\)}chain: How to Forget without Hard Forks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2017}, url = {http://eprint.iacr.org/2017/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PudduDC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QiLZQ17, author = {Saiyu Qi and Yichen Li and Yuanqing Zheng and Yong Qi}, title = {Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2017}, url = {http://eprint.iacr.org/2017/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QiLZQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.