@Preamble{
"\ifx \undefined \booktitle \def \booktitle #1{{\em #1}} \fi" #
"\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}} \fi" #
"\ifx \undefined \mathbf \def \mathbf #1{{\bf #1}} \fi" #
"\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}} \fi" #
"\ifx \undefined \mathsf \def \mathsf #1{{\sf #1}} \fi"
}
@String{ack-ksm = "Kevin S. McCurley, email:
\path=mccurley@www.swcp.com="}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-J-CRYPTOLOGY = "Journal of Cryptology: the journal of the
International Association for Cryptologic Research"}
@Article{Brickell:1988:E,
author = "E. F. Brickell",
title = "Editorial",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "1",
pages = "1--2",
month = "????",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 10:28:39 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-ksm # " and " # ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kaliski:1988:DES,
author = "Burton S. {Kaliski, Jr.} and Ronald L. Rivest and Alan
T. Sherman",
title = "Is the {Data Encryption Standard} a Group? (Results of
Cycling Experiments on {DES})",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "1",
pages = "3--36",
month = "????",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68P25)",
MRnumber = "89f:94017",
MRreviewer = "Zhen Fu Cao",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-ksm # " and " # ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Stinson:1988:SCB,
author = "D. R. Stinson",
title = "Some Constructions and Bounds for Authentication
Codes",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "1",
pages = "37--52 (or 37--51??)",
month = "????",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (90D05 94A29 94C30)",
MRnumber = "89e:94011",
MRreviewer = "Guy Jumarie",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-ksm # " and " # ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beauchemin:1988:GRN,
author = "Pierre Beauchemin and Gilles Brassard and Claude
Cr{\'e}peau and Claude Goutier and Carl Pomerance",
title = "The Generation of Random Numbers that Are Probably
Prime",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "1",
pages = "53--64",
month = "????",
year = "1988",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/BF00206325",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "11Y11 (11A51)",
MRnumber = "89g:11126",
MRreviewer = "Sun Qi",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-ksm # " and " # ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Chaum:1988:DCP,
author = "David Chaum",
title = "The Dining Cryptographers Problem: Unconditional
Sender and Recipient Untraceability",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "1",
pages = "65--75",
month = "????",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "89f:94014",
MRreviewer = "Yvo Desmedt",
bibdate = "Sat Oct 26 07:18:04 2002",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1021.html",
acknowledgement = ack-ksm # " and " # ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "information hiding; steganography",
}
@Article{Feige:1988:ZKP,
author = "Uriel Feige and Amos Fiat and Adi Shamir",
title = "Zero-knowledge proofs of identity",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "2",
pages = "77--94",
month = "????",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68P25 92A25)",
MRnumber = "90g:94014",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Weizmann Inst of Science",
affiliationaddress = "Rehovot, Isr",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Data Transmission; Identification
Schemes; Interactive Proofs of Knowledge; Secure
Communications; Zero-Knowledge Proofs",
}
@Article{McCurley:1988:KDS,
author = "Kevin S. McCurley",
title = "A key distribution system equivalent to factoring",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "2",
pages = "95--105",
month = "????",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (11T71)",
MRnumber = "89k:94050",
MRreviewer = "Rudolf Lidl",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Southern California",
affiliationaddress = "Los Angeles, CA, USA",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Data Transmission; Integer Factoring;
Key Distribution System; Public Key Cryptosystems;
Secure Communications; Signature Schemes",
}
@Article{Buchmann:1988:KES,
author = "Johannes Buchmann and H. C. Williams",
title = "A key-exchange system based on imaginary quadratic
fields",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "2",
pages = "107--118",
month = "????",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "11T71 (11R11 94A60)",
MRnumber = "90g:11166",
MRreviewer = "J. C. Lagarias",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ Duesseldorf",
affiliationaddress = "Duesseldorf, West Ger",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Data Transmission; Imaginary Quadratic
Fields; Key-Exchange Systems; Secret Cryptographic
Fields; Secure Communications",
}
@Article{Stinson:1988:CAS,
author = "D. R. Stinson",
title = "A construction for authentication\slash secrecy codes
from certain combinatorial designs",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "2",
pages = "119--127",
month = "????",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (05B30)",
MRnumber = "90e:94024",
MRreviewer = "Albrecht Beutelspacher",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Manitoba",
affiliationaddress = "Winnipeg, Manit, Can",
classification = "723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Authentication Codes; Codes, Symbolic; Cryptography;
Data Transmission; Mathematical
Techniques--Combinatorial Mathematics; Perpendicular
Arrays; Secrecy Codes; Secure Communications",
}
@Article{Beauchemin:1988:GHE,
author = "Pierre Beauchemin and Gilles Brassard",
title = "Generalization of {Hellman}'s extension to {Shannon}'s
approach to cryptography",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "2",
pages = "129--131",
month = oct,
year = "1988",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/BF02252870",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (94A15)",
MRnumber = "89k:94041",
bibdate = "Mon Jul 19 08:51:15 1999",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ de Montreal",
affiliationaddress = "Montreal, Que, Can",
classification = "723",
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Data Transmission; Information Theory;
Key Equivocation; Lower Bounds; Secure Communications;
Shannon Theory; Spurious Decipherments; Upper Bounds",
subject-dates = "Claude Elwood Shannon (1916--2001)",
}
@Article{Tompa:1988:HSS,
author = "Martin Tompa and Heather Woll",
title = "How to share a secret with cheaters",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "2",
pages = "133--138",
month = "????",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68Q25 (68P25 94A60)",
MRnumber = "90c:68030",
MRreviewer = "Armin Cremers",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "IBM, Thomas J. Watson Research Cent",
affiliationaddress = "Yorktown Heights, NY, USA",
classification = "723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cheating; Cryptography; Data Transmission;
Mathematical Techniques--Interpolation; Secret Sharing;
Secure Communications",
}
@Article{Koblitz:1989:HC,
author = "Neal Koblitz",
title = "Hyperelliptic cryptosystems",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "3",
pages = "139--150",
month = "????",
year = "1989",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "11T71 (11G20 11Y40 14G15 94A60)",
MRnumber = "90k:11165",
MRreviewer = "Min Qiang Huang",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Washington",
affiliationaddress = "Seattle, WA, USA",
classification = "723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Discrete Logarithms; Finite Abelian
Groups; Hyperelliptic Cryptosystems; Jacobians;
Mathematical Techniques--Algebra; Public Key
Cryptosystems",
}
@Article{Luby:1989:SPS,
author = "Michael Luby and Charles Rackoff",
title = "A study of password security",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "3",
pages = "151--158",
month = "????",
year = "1989",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/BF02252873",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68P25 (68N25 68Q25 94A60)",
MRnumber = "91a:68053",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib;
https://www.math.utah.edu/pub/tex/bib/unix.bib",
abstract = "We prove relationships between the security of a
function generator when used in an encryption scheme
and the security of a function generator when used in a
UNIX-like password scheme.",
acknowledgement = ack-nhfb,
affiliation = "Int Computer Science Inst",
affiliationaddress = "Berkeley, CA, USA",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Data Processing--Security of Data;
Password Security; Pseudorandom Function Generators;
UNIX",
}
@Article{Meier:1989:FCA,
author = "Willi Meier and Othmar Staffelbach",
title = "Fast correlation attacks on certain stream ciphers",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "3",
pages = "159--176",
month = "????",
year = "1989",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "90j:94029",
MRreviewer = "Zhao Zhi Zhang",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "HTL Brugg-Windisch",
affiliationaddress = "Windisch, Switz",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Programming--Algorithms; Cryptanalysis;
Cryptography; Fast Correlation Attacks; Linear Feedback
Shift Register Sequences; Stream Ciphers",
}
@Article{Boyar:1989:ISP,
author = "Joan Boyar",
title = "Inferring sequences produced by a linear congruential
generator missing low-order bits",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "3",
pages = "177--184",
month = "????",
year = "1989",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/BF02252875",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (11B50 11T71 11Y16 65C10)",
MRnumber = "90g:94012",
MRreviewer = "Min Qiang Huang",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Chicago",
affiliationaddress = "Chicago, IL, USA",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Programming--Algorithms; Cryptography; Linear
Congruential Method; Mathematical Statistics--Random
Number Generation; Pseudorandom Number Generators",
}
@Article{Piper:1989:LCS,
author = "Fred Piper and Michael Walker",
title = "Linear ciphers and spreads",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "3",
pages = "185--188",
month = "????",
year = "1989",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (51E23)",
MRnumber = "91g:94019",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of London",
affiliationaddress = "Egham, Engl",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Block Ciphers; Cryptography; Linear Ciphers;
Projective Planes; Spreads",
}
@Article{Abadi:1990:SCE,
author = "Martin Abadi and Joan Feigenbaum",
title = "Secure circuit evaluation. {A} protocol based on
hiding information from an oracle",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "1",
pages = "1--12",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68Q25 (68M10 68P25 68Q05 94A60)",
MRnumber = "91f:68079",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "DEC Systems Research Cent",
affiliationaddress = "Palo Alto, CA, USA",
classification = "723; 731; 921; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Networks--Protocols; Cryptography; Data
Processing--Security of Data; Hiding Information From
Oracle; Information Theory; Mathematical
Techniques--Polynomials; Probability--Game Theory;
Secure Circuit Evaluation; Two-Party Protocols",
}
@Article{Nishimura:1990:PMM,
author = "Kazuo Nishimura and Masaaki Sibuya",
title = "Probability to meet in the middle",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "1",
pages = "13--22",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68P25 (60C05 94A60)",
MRnumber = "91f:68036",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Komazawa Univ",
affiliationaddress = "Komazawa, Jpn",
classification = "723; 731; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Authentication; Birthday Problem; Cryptography; Data
Encription Standard; Digests; Information Theory--Data
Compression; Mash Functions; Probability; Urn Models",
}
@Article{Stinson:1990:CAS,
author = "D. R. Stinson",
title = "The combinatorics of authentication and secrecy
codes",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "1",
pages = "23--49",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (11T71 51E05 94A24)",
MRnumber = "91d:94015",
MRreviewer = "Ira S. Moskowitz",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Manitoba",
affiliationaddress = "Winnipeg, Manit, Can",
classification = "723; 731; 921; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Authentication Code; Codes, Symbolic--Encoding;
Combinatorial Design; Cryptography; Data
Processing--Security of Data; Information Theory;
Mathematical Techniques--Combinatorial Mathematics;
Probability; Secrecy Code",
}
@Article{Gong:1990:MKD,
author = "Li Gong and David J. Wheeler",
title = "A matrix key-distribution scheme",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "1",
pages = "51--59",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "91c:94021",
MRreviewer = "Henk Meijer",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Cambridge",
affiliationaddress = "Cambridge, Engl",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Communication Security; Computer Networks;
Cryptography; Data Processing--Security of Data; Key
Distribution; Private Key Cipher; Session Key",
}
@Article{Boyar:1990:DLI,
author = "Joan F. Boyar and Stuart A. Kurtz and Mark W.
Krentel",
title = "Discrete logarithm implementation of perfect
zero-knowledge blobs",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "2",
pages = "63--76",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68Q25 (68P25 94A60)",
MRnumber = "91m:68073",
MRreviewer = "Johan H{\aa}stad",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Chicago",
affiliationaddress = "Chicago, IL, USA",
classification = "723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Mathematical Techniques--Number Theory;
Product Blob; Zero Knowledge Blobs",
}
@Article{Simmons:1990:CPC,
author = "Gustavus J. Simmons",
title = "{Cartesian} product construction for unconditionally
secure authentication codes that permit arbitration",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "2",
pages = "77--104",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "92d:94021",
MRreviewer = "Yvo Desmedt",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Sandia Natl Lab",
affiliationaddress = "Albuquerque, NM, USA",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Authentication Codes; Cartesian Product Construction;
Codes, Symbolic--Encoding; Cryptography",
}
@Article{Niederreiter:1990:CAP,
author = "Harald Niederreiter",
title = "Combinatorial approach to probabilistic results on the
linear-complexity profile of random sequences",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "2",
pages = "105--112",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (65C10)",
MRnumber = "91g:94018",
MRreviewer = "Jozef Vysko{\v{c}}",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Austrian Acad of Sciences, Inst for Information
Processing",
affiliationaddress = "Vienna, Austria",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Complexity Profile; Cryptography; Linear Complexity;
Mathematical Statistics--Random Number Generation;
Probability--Random Processes",
}
@Article{Forre:1990:MID,
author = "R{\'e}jane Forr{\'e}",
title = "Methods and instruments for designing {$S$}-boxes",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "3",
pages = "115--130",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94B35 (94A17)",
MRnumber = "92f:94024",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Swiss Federal Inst of Technology",
affiliationaddress = "Zurich, Switz",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Metatheory--Boolean Functions; Conditional
Entropy; Cryptography; Probability--Random Processes;
S-Boxes; Walsh Transform",
}
@Article{Walker:1990:ITB,
author = "Michael Walker",
title = "Information-theoretic bounds for authentication
schemes",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "3",
pages = "131--143",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "91g:94020",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Racal Research Ltd",
affiliationaddress = "Berkshire, Engl",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Authentication Schemes; Codes, Symbolic--Encoding;
Cryptography; Encoding Rules; Incidence Structures;
Information Theory; Probability",
}
@Article{Murphy:1990:CFC,
author = "Sean Murphy",
title = "The cryptanalysis of {FEAL-}$4$ with 20 chosen
plaintexts",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "3",
pages = "145--154",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "91g:94017",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of London",
affiliationaddress = "Surrey, Engl",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptanalysis; Cryptography; feal-4 Block Cipher;
Plaintexts",
}
@Article{Mitchell:1990:EBF,
author = "Chris Mitchell",
title = "Enumerating {Boolean} functions of cryptographic
significance",
journal = j-J-CRYPTOLOGY,
volume = "2",
number = "3",
pages = "155--170",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94B35 (94A05)",
MRnumber = "92f:94025",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of London",
affiliationaddress = "Surrey, Engl",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Algorithm Design; Computer Metatheory--Boolean
Functions; Computer Programming--Algorithms;
Cryptography; Encryption Algorithms; Galois Fields",
}
@Article{Godlewski:1990:KMC,
author = "Philippe Godlewski and Chris Mitchell",
title = "Key-minimal cryptosystems for unconditional secrecy",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "1",
pages = "1--25",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "92f:94014",
MRreviewer = "Do Long Van",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Ecole Natl Sup{\'e}rieure des Telecommunications",
affiliationaddress = "Fr",
classification = "718; 723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Codes, Symbolic --- Encoding; Cryptography; Data
Processing --- Security of Data; L-Secrecy Systems;
Latin Squares; Mathematical Techniques --- Set Theory;
Perpendicular Arrays; Secrecy Codes",
}
@Article{Adams:1990:SDC,
author = "Carlisle Adams and Stafford Tavares",
title = "Structured design of cryptographically good
{$S$}-boxes",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "1",
pages = "27--41",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "91j:94018",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Queen's Univ at Kingston",
affiliationaddress = "Kingston, Ont, Can",
classification = "716; 723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Metatheory --- Boolean Functions; Computer
Workstations; Cryptography; Data Encryption Standard
(des); Data Processing --- Security of Data;
Mathematical Techniques --- Algorithms; Nonlinearities;
S-Boxes; Strict Avalanche Criterion",
}
@Article{Merkle:1990:FSO,
author = "Ralph C. Merkle",
title = "A fast software one-way hash function",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "1",
pages = "43--58",
month = "????",
year = "1990",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68P25",
MRnumber = "91m:68041",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Xerox PARC",
affiliationaddress = "Palo Alto, CA, USA",
classification = "723; 731",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Codes, Symbolic --- Encoding; Computer Crime ---
Viruses; Computer Programming --- Algorithms; Computer
Software; Cryptography; Data Processing --- Security of
Data; Manipulation Detection Codes (mdcs); Message
Digest Algorithm; One-Way Hash Function; Snefru Hash
Function",
}
@Article{Berson:1991:GEI,
author = "T. A. Berson and R. A. Rueppel",
title = "{Guest Editor}'s Introduction",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "2",
pages = "61--62",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-ksm # " and " # ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Agnew:1991:IFP,
author = "G. B. Agnew and R. C. Mullin and I. M. Onyszchuk and
S. A. Vanstone",
title = "An implementation for a fast public-key cryptosystem",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "2",
pages = "63--79",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "92b:94034",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Waterloo",
affiliationaddress = "Waterloo, Ont, Can",
classification = "713; 714; 723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Galois Field; Integrated Circuits,
VLSI--applications; Mathematical
Techniques--Applications; Public-Key Cryptosystem",
}
@Article{Gaarder:1991:AFA,
author = "Klaus Gaarder and Einar Snekkenes",
title = "Applying a formal analysis technique to the {CCITT}
{X}.509 strong two-way authentication protocol",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "2",
pages = "81--98",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 113 371",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Norwegian Telecom Research Dep",
affiliationaddress = "Kjeller, Norw",
classification = "723; 902",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Authentication; Computer Networks; Cryptographic
Protocols; Cryptography; Digital Communication
Systems--Standards; Formal Methods; Protocols",
}
@Article{Haber:1991:HTD,
author = "Stuart Haber and W. Scott Stornetta",
title = "How to time-stamp a digital document",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "2",
pages = "99--111",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Bellcore",
affiliationaddress = "Morristown, NJ, USA",
classification = "723; 914",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Networks--Security Systems; Cryptography;
Data Processing--Security of Data; Time-Stamp",
}
@Article{Matyas:1991:KPC,
author = "Stephen M. Matyas",
title = "Key processing with control vectors",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "2",
pages = "113--136",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "IBM Corp",
affiliationaddress = "Manassas, VA, USA",
classification = "723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Data Encryption Algorithms; Encryption;
Mathematical Techniques--Algorithms",
}
@Article{Pastor:1991:CCA,
author = "Jose Pastor",
title = "{CRYPTOPOST}. {A} cryptographic application to mail
processing",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "2",
pages = "137--146",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Pitney Bowes Corp",
affiliationaddress = "Stamford, CT, USA",
classification = "691; 723; 914",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Applications; Authentication of Documents;
Cryptography; Digital Signature; Mail
Handling--Security Systems",
}
@Article{Lenstra:1991:CRK,
author = "H. W. {Lenstra, Jr.}",
title = "On the {Chor--Rivest} knapsack cryptosystem",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "3",
pages = "149--155",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "92j:94012",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of California",
affiliationaddress = "Berkeley, CA, USA",
classification = "723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Chor--Rivest System; Computer Programming--Algorithms;
Computers--Computational Methods; Cryptography; Finite
Field; Mathematical Techniques--Finite Element Method;
Powerline System; Public-Key Cryptosystem",
}
@Article{Micali:1991:EPP,
author = "S. Micali and C. P. Schnorr",
title = "Efficient, perfect polynomial random number
generators",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "3",
pages = "157--172",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "65C10 (94A60)",
MRnumber = "92i:65020",
MRreviewer = "I. V{\u{a}}duva",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Massachusetts Inst of Technology",
affiliationaddress = "Cambridge, MA, USA",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Programming--Algorithms; Cryptography;
Mathematical Statistics--Random Number Generation;
Perfect Generators; Polynomial Generators; Random
Number Generators (RNGs); rsa-scheme; Statistical
Methods",
}
@Article{DeSoete:1991:NBC,
author = "Marijke {De Soete}",
title = "New bounds and constructions for authentication\slash
secrecy codes with splitting",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "3",
pages = "173--186",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (05B25)",
MRnumber = "92j:94011",
MRreviewer = "Jennifer Seberry",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "MBLE-I.S.G",
affiliationaddress = "Brussels, Belg",
classification = "723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Authentication Codes; Codes, Symbolic; Combinatorial
Design; Cryptography; Mathematical Models; Mathematical
Techniques--Geometry; Partial Geometry",
}
@Article{Kaliski:1991:OWP,
author = "Burton S. {Kaliski, Jr.}",
title = "One-way permutations on elliptic curves",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "3",
pages = "187--199",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "11G07 (11T71 94A60)",
MRnumber = "92j:11054",
MRreviewer = "A. Peth{\"o}",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "RSA Data Security Inc",
affiliationaddress = "Redwood City, CA, USA",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Programming--Algorithms; Cryptography;
Discrete Logarithms; Elliptic Curves; Mathematical
Statistics--Random Number Generation; One-Way
Functions",
}
@Article{Golic:1991:GCA,
author = "Jovan Dj. Goli{\'c} and Miodrag J. Mihaljevi{\'c}",
title = "Generalized correlation attack on a class of stream
ciphers based on the {Levenshtein} distance",
journal = j-J-CRYPTOLOGY,
volume = "3",
number = "3",
pages = "201--212",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "92g:94014",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Belgrade",
affiliationaddress = "Beograd, Yugosl",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Clock-Controlled Shift Registers; Computer
Programming--Algorithms; Cryptography; Crytoanalysis;
Levenshtein Distance; Mathematical Statistics; Sequence
Comparison",
}
@Article{Brickell:1991:EI,
author = "E. F. Brickell",
title = "Editorial Introduction",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "1",
pages = "1--2",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-ksm # " and " # ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biham:1991:DCL,
author = "Eli Biham and Adi Shamir",
title = "Differential cryptanalysis of {DES-like}
cryptosystems",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "1",
pages = "3--72",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "93j:94020",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Weizmann Inst of Science",
affiliationaddress = "Rehovot, Isr",
classification = "723; 902",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptanalytic Attack; Cryptography; Data Encryption
Standard; Differential Cryptanalysis; Standards",
}
@Article{Feigenbaum:1991:GEI,
author = "J. Feigenbaum",
title = "{Guest Editor}'s Introduction",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "2",
pages = "73--73",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-ksm # " and " # ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beaver:1991:SMP,
author = "D. Beaver",
title = "Secure Multiparty Protocols and Zero-Knowledge Proof
Systems Tolerating a Faulty Minority",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "2",
pages = "75--122",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 11:12:41 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Brickell:1991:CIS,
author = "E. F. Brickell and D. M. Davenport",
title = "On the Classification of Ideal Secret Sharing
Schemes",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "2",
pages = "123--134",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 11:12:41 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Maurer:1991:LRP,
author = "U. M. Maurer and J. L. Massey",
title = "Local Randomness in Pseudorandom Sequences",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "2",
pages = "135--149",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 11:12:41 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Naor:1991:BCU,
author = "M. Naor",
title = "Bit Commitment Using Pseudorandomness",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "2",
pages = "151--158",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 11:12:41 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Schnorr:1991:ESG,
author = "C.-P. Schnorr",
title = "Efficient Signature Generation by Smart Cards",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "3",
pages = "161--174",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 11:12:41 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goutier:1991:SII,
author = "C. Goutier {S. Bengio, G. Brassard, Y. G. Desmedt} and
J.-J. Quisquater",
title = "Secure Implementations of Identification Systems",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "3",
pages = "175--183",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 11:12:41 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Boyar:1991:PZK,
author = "Joan Boyar and Katalin Friedl and Carsten Lund",
title = "Practical Zero-Knowledge Proofs: Giving Hints and
Using Deficiencies",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "3",
pages = "185--206",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68T15 (94A60)",
MRnumber = "93m:68144",
MRreviewer = "Hans B. Sieburg",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
xxauthor = "K. Friedl J. F. Boyar and C. Lund",
}
@Article{Koblitz:1991:ECI,
author = "Neal Koblitz",
title = "Elliptic Curve Implementations of Zero-Knowledge
Blobs",
journal = j-J-CRYPTOLOGY,
volume = "4",
number = "3",
pages = "207--213",
month = "????",
year = "1991",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68Q25 (68R99 94A60)",
MRnumber = "93m:68080",
MRreviewer = "Johan H{\aa}stad",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
xxtitle = "Elliptic curve implementation of zero-knowledge
blobs",
}
@Article{Damgaard:1992:P,
author = "I. B. Damg{\aa}rd",
title = "Preface",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "1",
pages = "1--1",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bennett:1992:EQC,
author = "Charles {Bennett, H.} and Fran{\c{c}}ois Bessette and
Gilles Brassard and Louis Salvail",
title = "Experimental quantum cryptography",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "1",
pages = "3--28",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "IBM Research",
affiliationaddress = "New York, NY, USA",
classification = "723; 931",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Data Processing --- Security of Data;
Evaluation; Key Distribution; Privacy Amplification;
Quantum Cryptography; Quantum Theory --- Applications;
Reconciliation Protocols; Uncertainty Principle;
Unconditional Security",
}
@Article{Brickell:1992:IIS,
author = "Ernest F. Brickell and Kevin S. McCurley",
title = "Interactive identification scheme based on discrete
logarithms and factoring",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "1",
pages = "29--39",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Sandia Natl Lab",
affiliationaddress = "Albuquerque, NM, USA",
classification = "722; 723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Programming --- Algorithms; Cryptography;
Digital Signatures; Evaluation; Interactive
Identification; Mathematical Techniques --- Number
Theory; Microprocessor Chips --- Smart Cards; Witness
Hiding",
}
@Article{Evertse:1992:WNR,
author = "Jan-Hendrik Evertse and Eug{\`e}ne {van Heyst}",
title = "Which new {RSA}-signatures can be computed from
certain given {RSA}-signatures?",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "1",
pages = "41--52",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "93g:94010",
MRreviewer = "Hirosuke Yamamoto",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Leiden",
affiliationaddress = "Leiden, Neth",
classification = "723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Analysis; Computer Programming --- Algorithms;
Cryptographic Protocol; Cryptography; Mathematical
Techniques --- Number Theory; rsa Signatures",
}
@Article{Maurer:1992:CPS,
author = "Ueli M. Maurer",
title = "Conditionally-perfect secrecy and a provably-secure
randomized cipher",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "1",
pages = "53--66",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 171 358",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "ETH Zurich",
affiliationaddress = "Zurich, Switz",
classification = "723",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Automata Theory --- Theorem Proving; Book Cipher;
Cryptography; Data Processing --- Security of Data;
Information Theory; Perfect Secrecy; Provable Security;
Public Randomness; Randomized Encryption; Theory",
}
@Article{Meier:1992:CPC,
author = "Willi Meier and Othmar Staffelbach",
title = "Correlation properties of combiners with memory in
stream ciphers",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "1",
pages = "67--86",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 171 359",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "HTL Brugg-Windisch",
affiliationaddress = "Windisch, Switz",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Binary Sequences; Combiners; Computer Metatheory;
Computer Programming --- Algorithms; Cryptanalysis;
Cryptography --- Analysis; Information Theory ---
Correlation Theory; Linear Feedback Shift Registers
(lfsrs); Mathematical Statistics --- Random Number
Generation; Stream Cipher",
}
@Article{Maurer:1992:UST,
author = "Ueli M. Maurer",
title = "A universal statistical test for random bit
generators",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "2",
pages = "89--105",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "65C10 (68U20 94A60)",
MRnumber = "93e:65011",
MRreviewer = "I. V{\u{a}}duva",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "ETH Zuerich",
affiliationaddress = "Zuerich, Switz",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptographic Badness; Cryptography; Ergodic
Stationary Source; Exhaustive Key Search; Mathematical
Statistics; Random Bit Generator; Random Number
Generation; Randomness; State Transition Probabilities;
Statistical Methods --- Statistical Tests",
}
@Article{Lloyd:1992:CBF,
author = "Sheelagh Lloyd",
title = "Counting binary functions with certain cryptographic
properties",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "2",
pages = "107--131",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "93e:94010",
MRreviewer = "Thomas W. Cusick",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Hewlett Packard Lab",
affiliationaddress = "Bristol, Engl",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Balance Property; Binary Functions; Correlation
Immunity; Cryptographic Properties; Cryptography;
Information Theory --- Correlation Theory; Mathematical
Statistics --- Random Number Generation; Strict
Avalanche Criterion; Theory",
}
@Article{Georgiades:1992:SRS,
author = "Jean Georgiades",
title = "Some remarks on the security of the identification
scheme based on permuted kernels",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "2",
pages = "133--137",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 171 362",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Siemens AG",
affiliationaddress = "M{\"u}nchen, Ger",
classification = "723; 922",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography --- Theory; Game Theory; Permutations;
Permuted Kernels; Probability; Probability of Cheating;
Systems Science and Cybernetics --- Identification",
}
@Article{Loxton:1992:CRC,
author = "J. H. Loxton and David S. P. Khoo and Gregory J. Bird
and Jennifer Seberry",
title = "A cubic {RSA} code equivalent to factorization",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "2",
pages = "139--150",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "93c:94004",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Macquarie Univ",
affiliationaddress = "Aust",
classification = "723; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Programming --- Algorithms; Cryptography;
Cubic Residues; Data Processing --- Security of Data;
Eisenstein Integers; Encryption; Factorization;
Mathematical Techniques --- Number Theory; Public Key;
rsa Scheme; Theory",
}
@Article{Brickell:1992:SIB,
author = "E. F. Brickell and D. R. Stinson",
title = "Some improved bounds on the information rate of
perfect secret sharing schemes",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "3",
pages = "153--166",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68P25)",
MRnumber = "93j:94021",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Sandia Natl Lab",
affiliationaddress = "Albuquerque, NM, USA",
classification = "716.1; 723.1; 723.2; 921.4",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Data structures; Graph theory; Ideal
secret sharing; Information rate; Information theory;
Perfect secret sharing; Secret sharing; Security of
data",
}
@Article{Magliveras:1992:APC,
author = "Spyros S. Magliveras and Nasir D. Memon",
title = "Algebraic properties of cryptosystem {PGM}",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "3",
pages = "167--183",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68P25)",
MRnumber = "93h:94017",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Nebraska-Lincoln",
affiliationaddress = "Lincoln, NE, USA",
classification = "723.1; 723.2; 921.1; 921.3; 922.1",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Algebra; Cryptography; Data structures; Encoding
(symbols); Finite permutation group; Logarithmic
signatures; Mathematical transformations; Multiple
encryption; Number theory; Permutation group mappings
(pgm); Private key encryption; Probability; Security of
data",
}
@Article{Phillips:1992:SIS,
author = "Steven J. Phillips and Nicholas C. Phillips",
title = "Strongly ideal secret sharing schemes",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "3",
pages = "185--191",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68P25 (94A60)",
MRnumber = "93g:68031",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Computer Science Dep",
affiliationaddress = "Stanford, CA, USA",
classification = "716.1; 723.1; 723.2",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Access structures; Cryptography; Data structures;
Decoding; Encoding (symbols); Hierarchical systems;
Ideal schemes; Information theory; Perfect security;
Secret sharing; Security of data",
}
@Article{Dai:1992:BSD,
author = "Zong Duo Dai",
title = "Binary sequences derived from {ML}-sequences over
rings {I}: {Periods} and minimal polynomials",
journal = j-J-CRYPTOLOGY,
volume = "5",
number = "3",
pages = "193--207",
month = "????",
year = "1992",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68P25 (68Q40)",
MRnumber = "93g:68030",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of London",
affiliationaddress = "Surrey, Engl",
classification = "723.1; 723.2; 921.1",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Algebra; Binary sequences; Cryptography; Integral
rings; Maximal length sequences; Minimal polynomials;
Number theory; Periods; Polynomials; Random number
generation",
}
@Article{Brassard:1993:EN,
author = "G. Brassard",
title = "{Editor}'s Note",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "1",
pages = "1--1",
month = "Winter",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-ksm # " and " # ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Agnew:1993:AO,
author = "G. B. Agnew and T. Beth and R. C. Mullin and S. A.
Vanstone",
title = "Arithmetic operations in {$ {\rm GF}(2^m)$}",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "1",
pages = "3--13",
month = "Winter",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "93m:94018",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Waterloo",
affiliationaddress = "Waterloo, Ont, Can",
classification = "721.1; 722.4; 723.1; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computation theory; Cryptography; Digital arithmetic;
Discrete exponentiation; Mathematical operators;
Multiplicative inverses; Normal basis; Parallel
processing systems; Public key cryptography",
}
@Article{Ito:1993:MAS,
author = "Mitsuru Ito and Akira Saito and Takao Nishizeki",
title = "Multiple assignment scheme for sharing secret",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "1",
pages = "15--20",
month = "Winter",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "94b:94018",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Mitsubishi Co",
affiliationaddress = "Kanagawa, Jpn",
classification = "721.1; 723.1; 723.2; 921.4",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Access structure; Cryptography; Data handling; Data
structures; Multiple assignment scheme; Secret sharing;
Security of data; Set theory; Sperner family; State
assignment; Theorem proving; Threshold scheme",
}
@Article{Goldreich:1993:UCT,
author = "Oded Goldreich",
title = "Uniform-Complexity Treatment of Encryption and
Zero-Knowledge",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "1",
pages = "21--53",
month = "Winter",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "94e:94013",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Technion",
affiliationaddress = "Haifa, Isr",
classification = "721.1; 723.1; 922.1",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Commitment schemes; Computational complexity;
Cryptography; Encryption; Probability; Security of
data; Theorem proving; Uniform complexity measures;
Zero knowledge",
}
@Article{Maurer:1993:CCI,
author = "Ueli M. Maurer and James L. Massey",
title = "Cascade ciphers: {The} importance of being first",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "1",
pages = "55--61",
month = "Winter",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "ETH Zurich",
affiliationaddress = "Zurich, Switz",
classification = "721.1; 723.1; 723.2",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cascade ciphers; Codes (symbols); Computational
complexity; Computational security; Cryptography;
Decoding; Multiple encryption; Provable security;
Security of data; Theorem proving",
}
@Article{Boyar:1993:CCZ,
author = "Joan Boyar and Carsten Lund and Ren{\'e} Peralta",
title = "On the communication complexity of zero-knowledge
proofs",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "2",
pages = "65--85",
month = "Spring",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (03D15 68P25 68Q15)",
MRnumber = "94g:94017",
MRreviewer = "Xiang Li",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Chicago",
affiliationaddress = "Chicago, IL, USA",
classification = "716",
conferenceyear = "1993",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Circuit theory; Circuit-based methods; Communication
complexity; Cryptographic protocols; Cryptography;
Zero-knowledge proofs",
publisherinfo = "Service Center Secaucus",
xxauthor = "Joan Boyar and Carsten Lund",
}
@Article{Chor:1993:SSI,
author = "Benny Chor and Eyal Kushilevitz",
title = "Secret sharing over infinite domains",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "2",
pages = "87--95",
month = "Spring",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "94f:94006",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Technion",
affiliationaddress = "Haifa, Isr",
classification = "716",
conferenceyear = "1993",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Encryption; Infinite domain secret
sharing; Private-key encryption schemes; Secret sharing
possibility",
publisherinfo = "Service Center Secaucus",
}
@Article{Goldreich:1993:PZK,
author = "Oded Goldreich and Eyal Kushilevitz",
title = "A Perfect Zero-knowledge Proof System for a Problem
Equivalent to the Discrete Algorithm",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "2",
pages = "97--116",
month = "Spring",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "68T15 (68Q25 94A60)",
MRnumber = "94e:68152",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Technion",
affiliationaddress = "Haifa, Isr",
classification = "716; 921",
conferenceyear = "1993",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Discrete logarithm problem; Finite
Abelian group; Perfect zero-knowledge proof systems;
Polynomials; Zero-proof systems",
publisherinfo = "Service Center Secaucus",
xxtitle = "A perfect zero-knowledge proof system for a problem
equivalent to the discrete logarithm",
}
@Article{Schrift:1993:UTN,
author = "A. W. Schrift and A. Shamir",
title = "Universal tests for nonuniform distributions",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "3",
pages = "119--133",
month = "Summer",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "94g:94028",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Weizmann Inst of Science",
affiliationaddress = "Rehovot, Isr",
classification = "721.1; 723.2; 922.1; 922.2",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Binary sequences; Cryptography; Independent biased
source; Mathematical models; Next bit test; Nonuniform
distribution; Random number generation; Randomness;
Statistical tests; Universal test",
}
@Article{Rosenbaum:1993:LBA,
author = "Ute Rosenbaum",
title = "Lower bound on authentication after having observed a
sequence of messages",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "3",
pages = "135--156",
month = "Summer",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "94g:94025",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Siemens AG",
affiliationaddress = "M{\"u}nchen, Ger",
classification = "723.2; 922.1",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Authentication systems; Cryptography; Encoding
(symbols); Probability; Security of data",
}
@Article{Capocelli:1993:SSS,
author = "R. M. Capocelli and A. {De Santis} and L. Gargano and
U. Vaccaro",
title = "On the size of shares for secret sharing schemes",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "3",
pages = "157--167",
month = "Summer",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Universita di Roma",
affiliationaddress = "Roma, Italy",
classification = "723.2; 921.4; 922.1",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Access structures; Cryptography; Ideal secret sharing
schemes; Perfect security; Probability; Secret sharing;
Security of data; Set theory",
}
@Article{Coppersmith:1993:MNF,
author = "Don Coppersmith",
title = "Modifications to the number field sieve",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "3",
pages = "169--180",
month = "Summer",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "11Y05 (11A51 11Y40 68Q25)",
MRnumber = "94h:11111",
MRreviewer = "Joe P. Buhler",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Thomas J. Watson Research Cent",
affiliationaddress = "Yorktown Heights, NY, USA",
classification = "721.1; 723.1; 723.2; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Algorithms; Computational complexity; Computational
methods; Cryptography; Factoring; Modification; Number
field sieve; Number theory; Sieve methods; Table
lookup",
}
@Article{Orton:1993:DFP,
author = "Glenn Orton and Lloyd Peppard and Stafford Tavares",
title = "Design of a fast pipelined modular multiplier based on
a diminished-radix algorithm",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "4",
pages = "183--208",
month = "Fall",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Queen's Univ",
affiliationaddress = "Kingston, Ont, Can",
classification = "714.2; 722.1; 723.2; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Algorithms; cmos integrated circuits; Computation
theory; Computer arithmetic; Cryptography; Design;
Encryption; Modular exponentiation; Modular
multiplication; Multiplying circuits; Pipelining; VLSI
circuits",
}
@Article{Menezes:1993:ECC,
author = "Alfred J. Menezes and Scott A. Vanstone",
title = "Elliptic curve cryptosystems and their
implementation",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "4",
pages = "209--224",
month = "Fall",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "94g:94021",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Waterloo",
affiliationaddress = "Waterloo, Ont, Can",
classification = "722.4; 723.2; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Analysis; Computer systems; Cryptography; Elliptic
curve cryptosystems; Implementation; Mathematical
models; Public key cryptography",
}
@Article{Lenstra:1993:UIK,
author = "Arjen K. Lenstra and Yacov Yacobi",
title = "User impersonation in key certification schemes",
journal = j-J-CRYPTOLOGY,
volume = "6",
number = "4",
pages = "225--232",
month = "Fall",
year = "1993",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Bellcore",
affiliationaddress = "Morristown, NJ, USA",
classification = "722.4; 723.2; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Certification authority; Cryptography; Key
certification; Mathematical models; Mathematical
techniques; Public key",
}
@Article{Goldreich:1994:DPZ,
author = "Oded Goldreich and Yair Oren",
title = "Definitions and Properties of Zero-Knowledge Proof
Systems",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "1",
pages = "1--32",
month = "Winter",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68P25 68Q15)",
MRnumber = "94m:94016",
MRreviewer = "Joan Boyar",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Technion",
affiliationaddress = "Haifa, Isr",
classification = "721.1; 722.3; 723.2",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computational complexity; Computational
indistinguishability; Cryptographic protocol
composition; Cryptography; Formal languages; Network
protocols; Terminology; Theorem proving; Zero
knowledge",
}
@Article{Klapper:1994:VGS,
author = "Andrew Klapper",
title = "The Vulnerability of Geometric Sequences Based on
Fields of Odd Characteristic",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "1",
pages = "33--51",
month = "Winter",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "94j:94015",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Manitoba",
affiliationaddress = "Winnipeg, Manit, Can",
classification = "721.1; 723.1; 723.2; 921.1; 922.1; 922.2",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Algorithms; Binary sequences; Computational
complexity; Cryptanalysis; Cryptography; Data
reduction; Galois field; Geometric sequences; Number
theory; Partial imbalance; Prime numbers; Probability;
Statistical tests",
}
@Article{Chor:1994:SPH,
author = "Benny Chor and Mihaly Gereb-Graus and Eyal
Kushilevitz",
title = "On the Structure of the Privacy Hierarchy",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "1",
pages = "53--60",
month = "Winter",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "94j:94013",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Technion",
affiliationaddress = "Haifa, Isr",
classification = "721.1; 722.4; 723.2",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Cryptography; Distributed computer systems; Function
evaluation; Hierarchical systems; Private functions;
Private hierarchy; Security of data; Theorem proving",
}
@Article{Murphy:1994:WCG,
author = "Sean Murphy and Kenneth Paterson and Peter Wild",
title = "A Weak Cipher that Generates the Symmetric Group",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "1",
pages = "61--65",
month = "Winter",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "94i:94017",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of London",
affiliationaddress = "Surrey, UK",
classification = "721.1; 723.2; 921.6; 922.1",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Block cipher; Computational complexity; Cryptography;
Function evaluation; Iterative methods; Permutation
group; Probability; Security of data",
}
@Article{Simmons:1994:PSI,
author = "G. J. Simmons",
title = "Proof of soundness (integrity) of cryptographic
protocols",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "2",
pages = "69--77",
month = "Spring",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
classification = "716; 722.3; 723.1.1; 903.3; 921",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Complex systems; Correctness of information;
Cryptographic protocols; Cryptography; Formal
languages; Information use; Mathematical techniques;
Network protocols; Proof of soundness; Protocol
failures",
}
@Article{Kemmerer:1994:TSC,
author = "R. Kemmerer and C. Meadows and J. Millen",
title = "Three systems for cryptographic protocol analysis",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "2",
pages = "79--130",
month = "Spring",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Nov 21 09:52:57 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of California",
affiliationaddress = "Santa Barbara, CA, USA",
classification = "716; 722.3; 723.1.1; 723.2; 921.6",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Authentication; Cryptographic protocol analysis;
Cryptography; Formal languages; Formal methods;
Interrogator; Key distribution; Mathematical
techniques; Network protocols; Security of data",
}
@Article{OConnor:1994:ACA,
author = "Luke O'Connor",
title = "An Analysis of a Class of Algorithms for {$S$}-Box
Construction",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "3",
pages = "133--151",
month = "Summer",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "95e:94040",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Distributed System Technology Cent (DSTC)",
affiliationaddress = "Brisbane, Aust",
classification = "721.1; 723.2; 921.1; 921.6",
conferenceyear = "1994",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Algorithms; Bit by bit methods; Boolean algebra;
Conformal mapping; Cryptography; Digital arithmetic;
Iterative methods; Mathematical models; Nonlinear
equations; Permutations; Product ciphers; S boxes;
Table lookup",
publisherinfo = "Service Center Secaucus",
}
@Article{Teng:1994:FIC,
author = "Shang-Hua Teng",
title = "Functional Inversion and Communication Complexity",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "3",
pages = "153--170",
month = "Summer",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68Q25 68Q35)",
MRnumber = "95d:94028",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Xerox Corp",
affiliationaddress = "Palo Alto, CA, USA",
classification = "721.1; 721.3; 722.3; 723.2; 921.1; 921.6",
conferenceyear = "1994",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Boolean algebra; Boolean circuits; Communication
complexity; Computational complexity; Cryptanalysis;
Cryptography; Function evaluation; Functional
inversion; Integrated circuit layout; Inverse problems;
Logic circuits; Multiparty problems; Network protocols;
One way functions; Polynomials; Ring protocol; Theorem
proving; Topology; Tree protocol; VLSI circuits",
publisherinfo = "Service Center Secaucus",
}
@Article{Scheidler:1994:KEP,
author = "Renate Scheidler and Johannes A. Buchmann and Hugh C.
Williams",
title = "A Key-Exchange Protocol Using Real Quadratic Fields",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "3",
pages = "171--199",
month = "Summer",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (11T71)",
MRnumber = "96e:94015",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "Compendex database;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Delaware",
affiliationaddress = "Newark, DE, USA",
classification = "721.1; 722.3; 722.4; 723.2; 921.6",
conferenceyear = "1994",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Algorithms; Computational complexity; Computational
methods; Cryptography; Data communication systems;
Discrete logarithm; Integers; Key exchange protocol;
Network protocols; Real quadratic fields; Real time
systems",
publisherinfo = "Service Center Secaucus",
}
@Article{Qu:1994:FEA,
author = "Ming Hua Qu and S. A. Vanstone",
title = "Factorizations in the Elementary {Abelian} $p$-Group
and Their Cryptographic Significance",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "4",
pages = "201--212",
month = "Fall",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (20K01 68P25)",
MRnumber = "96b:94011",
MRreviewer = "Do Long Van",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{OConnor:1994:ANA,
author = "Luke O'Connor and Andrew Klapper",
title = "Algebraic Nonlinearity and Its Applications to
Cryptography",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "4",
pages = "213--227",
month = "Fall",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "95h:94024",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biham:1994:NTC,
author = "E. Biham",
title = "New Types of Cryptanalytic Attacks Using Related
Keys",
journal = j-J-CRYPTOLOGY,
volume = "7",
number = "4",
pages = "229--??",
month = "Fall",
year = "1994",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Davies:1995:PTS,
author = "D. Davies and S. Murphy",
title = "Pairs and Triplets of {DES} {$S$}-Boxes",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "1",
pages = "1--??",
month = "Winter",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Nyberg:1995:PSA,
author = "Kaisa Nyberg and Lars Ramkilde Knudsen",
title = "Provable Security Against a Differential Attack",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "1",
pages = "27--37",
month = "Winter",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "95m:94007",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Blundo:1995:GDS,
author = "C. Blundo and A. {De Santis} and D. R. Stinson and U.
Vaccaro",
title = "Graph Decompositions and Secret Sharing Schemes",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "1",
pages = "39--64",
month = "Winter",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "96a:94011",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{OConnor:1995:DCB,
author = "L. O'Connor",
title = "On the Distribution of Characteristics in Bijective
Mappings",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "2",
pages = "67--??",
month = "Spring",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Russell:1995:NSC,
author = "Alexander Russell",
title = "Necessary and Sufficient Conditions for Collision-Free
Hashing",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "2",
pages = "87--99",
month = "Spring",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68Q20)",
MRnumber = "95m:94008",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Vanstone:1995:SRK,
author = "S. A. Vanstone and R. J. Zuccherato",
title = "Short {RSA} Keys and Their Generation",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "2",
pages = "101--??",
month = "Spring",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Yang:1995:FEB,
author = "Yi Xian Yang and Bao An Guo",
title = "Further Enumerating {Boolean} Functions of
Cryptographic Parameters",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "3",
pages = "115--122",
month = "Summer",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 346 018",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
xxtitle = "Further enumerating {Boolean} functions of
cryptographic significance",
}
@Article{Maurer:1995:FGP,
author = "Ueli M. Maurer",
title = "Fast Generation of Prime Numbers and Secure Public-Key
Cryptographic Parameters",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "3",
pages = "123--155",
month = "Summer",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (11T71)",
MRnumber = "96i:94021",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Blackburn:1995:CPK,
author = "Simon Blackburn and Sean Murphy and Jacques Stern",
title = "The Cryptanalysis of a Public-Key Implementation of
Finite Group Mappings",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "3",
pages = "157--166",
month = "Summer",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "96k:94008",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Stinson:1995:ICC,
author = "D. R. Stinson and J. L. Massey",
title = "An Infinite Class of Counterexamples to a Conjecture
Concerning Nonlinear Resilient Functions",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "3",
pages = "167--173",
month = "Summer",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "96g:94015",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Pei:1995:ITB,
author = "Ding Yi Pei",
title = "Information-Theoretic Bounds for Authentication Codes
and Block Designs",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "4",
pages = "177--188",
month = "Fall",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "96f:94013",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dyer:1995:KSS,
author = "Martin Dyer and Trevor Fenner and Alan Frieze and
Andrew Thomason",
title = "On Key Storage in Secure Networks",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "4",
pages = "189--??",
month = "Fall",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Damgaard:1995:PPS,
author = "I. B. Damg{\aa}rd",
title = "Practical and Provably Secure Release of a Secret and
Exchange of Signatures",
journal = j-J-CRYPTOLOGY,
volume = "8",
number = "4",
pages = "201--??",
month = "Fall",
year = "1995",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Heys:1996:SPN,
author = "Howard M. Heys and Stafford E. Tavares",
title = "Substitution-Permutation Networks Resistant to
Differential and Linear Cryptanalysis",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "1",
pages = "1--19",
month = "Winter",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "96k:94010",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n1p1.html;
http://link.springer.de/link/service/journals/00145/bibs/9n1p1.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n1p1.tex;
http://link.springer.de/link/service/journals/00145/tocs/00901.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ben-Aroya:1996:DCL,
author = "Ishai Ben-Aroya and Eli Biham",
title = "Differential Cryptanalysis of {Lucifer}",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "1",
pages = "21--34",
month = "Winter",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n1p21.html;
http://link.springer.de/link/service/journals/00145/bibs/9n1p21.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n1p21.tex;
http://link.springer.de/link/service/journals/00145/tocs/00901.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Even:1996:LLD,
author = "Shimon Even and Oded Goldreich and Silvio Micali",
title = "On-Line\slash Off-Line Digital Signatures",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "1",
pages = "35--67",
month = "Winter",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 381 075",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n1p35.html;
http://link.springer.de/link/service/journals/00145/bibs/9n1p35.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n1p35.tex;
http://link.springer.de/link/service/journals/00145/tocs/00901.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fischer:1996:BSK,
author = "Michael J. Fischer and Rebecca N. Wright",
title = "Bounds on Secret Key Exchange Using a Random Deal of
Cards",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "2",
pages = "71--99",
month = "Spring",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "97b:94021",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n2p71.html;
http://link.springer.de/link/service/journals/00145/bibs/9n2p71.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n2p71.tex;
http://link.springer.de/link/service/journals/00145/tocs/00902.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Itoh:1996:LCC,
author = "Toshiya Itoh and Masafumi Hoshi and Shigeo Tsujii",
title = "A Low Communication Competitive Interactive Proof
System for Promised Quadratic Residuosity",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "2",
pages = "101--109",
month = "Spring",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "96k:94011",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n2p101.html;
http://link.springer.de/link/service/journals/00145/bibs/9n2p101.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n2p101.tex;
http://link.springer.de/link/service/journals/00145/tocs/00902.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Golic:1996:CPG,
author = "Jovan Dj. Golic",
title = "Correlation Properties of a General Binary Combiner
with Memory",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "2",
pages = "111--126",
month = "Spring",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n2p111.html;
http://link.springer.de/link/service/journals/00145/bibs/9n2p111.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n2p111.tex;
http://link.springer.de/link/service/journals/00145/tocs/00902.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Crepeau:1996:GEI,
author = "Claude Cr{\'e}peau",
title = "{Guest Editor}'s Introduction",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "3",
pages = "127--128",
month = "Summer",
year = "1996",
bibdate = "Sat Nov 21 09:26:08 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n3p127.html;
http://link.springer.de/link/service/journals/00145/bibs/9n3p127.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n3p127.tex;
http://link.springer.de/link/service/journals/00145/tocs/00902.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{DeSantis:1996:PPZ,
author = "Alfredo {De Santis} and Giuseppe Persiano",
title = "The Power of Preprocessing in Zero-Knowledge Proofs of
Knowledge",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "3",
pages = "129--148",
month = "Summer",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "97f:94007",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n3p129.html;
http://link.springer.de/link/service/journals/00145/bibs/9n3p129.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n3p129.tex;
http://link.springer.de/link/service/journals/00145/tocs/00903.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bellare:1996:CPN,
author = "Mihir Bellare and Moti Yung",
title = "Certifying Permutations: Noninteractive Zero-Knowledge
Based on Any Trapdoor Permutation",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "3",
pages = "149--166",
month = "Summer",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "97f:94005",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n3p149.html;
http://link.springer.de/link/service/journals/00145/bibs/9n3p149.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n3p149.tex;
http://link.springer.de/link/service/journals/00145/tocs/00903.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goldreich:1996:HCC,
author = "Oded Goldreich and Ariel Kahan",
title = "How To Construct Constant-Round Zero-Knowledge Proof
Systems for {NP}",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "3",
pages = "167--189",
month = "Summer",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "97f:94008",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n3p167.html;
http://link.springer.de/link/service/journals/00145/bibs/9n3p167.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n3p167.tex;
http://link.springer.de/link/service/journals/00145/tocs/00903.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fischer:1996:SPO,
author = "M. J. Fischer and S. Micali and C. Rackoff",
title = "A Secure Protocol for the Oblivious Transfer (Extended
Abstract)",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "3",
pages = "191--195",
month = "Summer",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 403 497",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n3p191.html;
http://link.springer.de/link/service/journals/00145/bibs/9n3p191.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n3p191.tex;
http://link.springer.de/link/service/journals/00145/tocs/00903.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Impagliazzo:1996:ECS,
author = "Russell Impagliazzo and Moni Naor",
title = "Efficient Cryptographic Schemes Provably as Secure as
Subset Sum",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "4",
pages = "199--216",
month = "Fall",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (65C10)",
MRnumber = "97k:94030",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n4p199.html;
http://link.springer.de/link/service/journals/00145/bibs/9n4p199.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n4p199.tex;
http://link.springer.de/link/service/journals/00145/tocs/00904.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Franklin:1996:JEM,
author = "Matthew Franklin and Stuart Haber",
title = "Joint Encryption and Message-Efficient Secure
Computation",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "4",
pages = "217--232",
month = "Fall",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "97h:94010",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n4p217.html;
http://link.springer.de/link/service/journals/00145/bibs/9n4p217.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n4p217.tex;
http://link.springer.de/link/service/journals/00145/tocs/00904.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jackson:1996:ISS,
author = "Wen-Ai Jackson and Keith M. Martin and Christine M.
O'Keefe",
title = "Ideal Secret Sharing Schemes with Multiple Secrets",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "4",
pages = "233--250",
month = "Fall",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68P25)",
MRnumber = "98e:94019",
MRreviewer = "Ugo Vaccaro",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n4p233.html;
http://link.springer.de/link/service/journals/00145/bibs/9n4p233.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n4p233.tex;
http://link.springer.de/link/service/journals/00145/tocs/00904.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Han:1996:PGF,
author = "Yenjo Han and Lane A. Hemaspaandra",
title = "Pseudorandom Generators and the Frequency of
Simplicity",
journal = j-J-CRYPTOLOGY,
volume = "9",
number = "4",
pages = "251--261",
month = "Fall",
year = "1996",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (65C10)",
MRnumber = "98a:94021",
MRreviewer = "Robert M. Baer",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/9n4p251.html;
http://link.springer.de/link/service/journals/00145/bibs/9n4p251.pdf;
http://link.springer.de/link/service/journals/00145/bibs/9n4p251.tex;
http://link.springer.de/link/service/journals/00145/tocs/00904.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{deRooij:1997:SPD,
author = "Peter {de Rooij}",
title = "On {Schnorr}'s Preprocessing for Digital Signature
Schemes",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "1",
pages = "1--16",
month = "Winter",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n1p1.html;
http://link.springer.de/link/service/journals/00145/bibs/10n1p1.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n1p1.tex;
http://link.springer.de/link/service/journals/00145/tocs/01001.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beaver:1997:LRR,
author = "D. Beaver and J. Feigenbaum and J. Kilian and P.
Rogaway",
title = "Locally Random Reductions: Improvements and
Applications",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "1",
pages = "17--36",
month = "Winter",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68Q15)",
MRnumber = "98g:94022",
MRreviewer = "Claus-Peter Schnorr",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n1p17.html;
http://link.springer.de/link/service/journals/00145/bibs/10n1p17.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n1p17.tex;
http://link.springer.de/link/service/journals/00145/tocs/01001.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Itoh:1997:LDC,
author = "Toshiya Itoh and Yuji Ohta and Hiroki Shizuya",
title = "A Language-Dependent Cryptographic Primitive",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "1",
pages = "37--49",
month = "Winter",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "98m:94037",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n1p37.html;
http://link.springer.de/link/service/journals/00145/bibs/10n1p37.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n1p37.tex;
http://link.springer.de/link/service/journals/00145/tocs/01001.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dobbertin:1997:RTC,
author = "H. Dobbertin",
title = "{RIPEMD} with Two-Round Compress Function Is Not
Collision-Free",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "1",
pages = "51--69",
month = "Winter",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n1p51.html;
http://link.springer.de/link/service/journals/00145/bibs/10n1p51.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n1p51.tex;
http://link.springer.de/link/service/journals/00145/tocs/01001.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kaliski:1997:CMA,
author = "B. S. Kaliski",
title = "A Chosen Message Attack on {Demytko}'s Elliptic Curve
Cryptosystem",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "1",
pages = "71--72",
month = "Winter",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n1p71.html;
http://link.springer.de/link/service/journals/00145/bibs/10n1p71.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n1p71.tex;
http://link.springer.de/link/service/journals/00145/tocs/01001.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fiat:1997:BR,
author = "A. Fiat",
title = "Batch {RSA}",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "2",
pages = "75--88",
month = "Spring",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n2p75.html;
http://link.springer.de/link/service/journals/00145/bibs/10n2p75.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n2p75.tex;
http://link.springer.de/link/service/journals/00145/tocs/01002.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Yacobi:1997:BDK,
author = "Y. Yacobi and M. J. Beller",
title = "Batch {Diffie--Hellman} Key Agreement Systems",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "2",
pages = "89--96",
month = "Spring",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n2p89.html;
http://link.springer.de/link/service/journals/00145/bibs/10n2p89.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n2p89.tex;
http://link.springer.de/link/service/journals/00145/tocs/01002.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cachin:1997:LIR,
author = "C. Cachin and U. M. Maurer",
title = "Linking Information Reconciliation and Privacy
Amplification",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "2",
pages = "97--110",
month = "Spring",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n2p97.html;
http://link.springer.de/link/service/journals/00145/bibs/10n2p97.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n2p97.tex;
http://link.springer.de/link/service/journals/00145/tocs/01002.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Klapper:1997:FSR,
author = "Andrew Klapper and Mark Goresky",
title = "Feedback Shift Registers, {$2$}-Adic Span, and
Combiners with Memory",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "2",
pages = "111--147",
month = "Spring",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A55 (94A60)",
MRnumber = "98f:94012",
MRreviewer = "Shojiro Sakata",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n2p111.html;
http://link.springer.de/link/service/journals/00145/bibs/10n2p111.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n2p111.tex;
http://link.springer.de/link/service/journals/00145/tocs/01002.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Even:1997:CCS,
author = "Shimon Even and Yishay Mansour",
title = "A Construction of a Cipher from a Single Pseudorandom
Permutation",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "3",
pages = "151--161",
month = "Summer",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "98j:94019",
MRreviewer = "Mu Lan Liu",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n3p151.html;
http://link.springer.de/link/service/journals/00145/bibs/10n3p151.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n3p151.tex;
http://link.springer.de/link/service/journals/00145/tocs/01003.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Damgaard:1997:ESH,
author = "Ivan B. Damg{\aa}rd and Torben P. Pedersen and Birgit
Pfitzmann",
title = "On the Existence of Statistically Hiding Bit
Commitment Schemes and Fail-Stop Signatures",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "3",
pages = "163--194",
month = "Summer",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68P25)",
MRnumber = "98e:94016",
MRreviewer = "Luis Hern{\'a}ndez Encinas",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n3p163.html;
http://link.springer.de/link/service/journals/00145/bibs/10n3p163.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n3p163.tex;
http://link.springer.de/link/service/journals/00145/tocs/01003.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biham:1997:IDA,
author = "Eli Biham and Alex Biryukov",
title = "An Improvement of {Davies}' Attack on {DES}",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "3",
pages = "195--205",
month = "Summer",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n3p195.html;
http://link.springer.de/link/service/journals/00145/bibs/10n3p195.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n3p195.tex;
http://link.springer.de/link/service/journals/00145/tocs/01003.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Coppersmith:1997:SBP,
author = "Don Coppersmith and Jacques Stern and Serge Vaudenay",
title = "The Security of the Birational Permutation Signature
Schemes",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "3",
pages = "207--221",
month = "Summer",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94Axx (13Pxx)",
MRnumber = "1 456 328",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n3p207.html;
http://link.springer.de/link/service/journals/00145/bibs/10n3p207.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n3p207.tex;
http://link.springer.de/link/service/journals/00145/tocs/01003.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Csirmaz:1997:SSM,
author = "L{\'a}szl{\'o} Csirmaz",
title = "The Size of a Share Must Be Large",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "4",
pages = "223--231",
month = "Fall",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "98k:94008",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n4p223.html;
http://link.springer.de/link/service/journals/00145/bibs/10n4p223.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n4p223.tex;
http://link.springer.de/link/service/journals/00145/tocs/01004.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Coppersmith:1997:SSP,
author = "Don Coppersmith",
title = "Small Solutions to Polynomial Equations, and Low
Exponent {RSA} Vulnerabilities",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "4",
pages = "233--260",
month = "Fall",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (11Y05)",
MRnumber = "1 476 612",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n4p233.html;
http://link.springer.de/link/service/journals/00145/bibs/10n4p233.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n4p233.tex;
http://link.springer.de/link/service/journals/00145/tocs/01004.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jackson:1997:MTA,
author = "Wen-Ai Jackson and Keith M. Martin and Christine M.
O'Keefe",
title = "Mutually Trusted Authority-Free Secret Sharing
Schemes",
journal = j-J-CRYPTOLOGY,
volume = "10",
number = "4",
pages = "261--289",
month = "Fall",
year = "1997",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "98m:94038",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/10n4p261.html;
http://link.springer.de/link/service/journals/00145/bibs/10n4p261.pdf;
http://link.springer.de/link/service/journals/00145/bibs/10n4p261.tex;
http://link.springer.de/link/service/journals/00145/tocs/01004.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kilian:1998:ENZ,
author = "Joe Kilian and Erez Petrank",
title = "An Efficient Noninteractive Zero-Knowledge Proof
System for {NP} with General Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "1",
pages = "1--27",
month = "Winter",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 609 465",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n1p1.html;
http://link.springer.de/link/service/journals/00145/bibs/11n1p1.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n1p1.tex;
http://link.springer.de/link/service/journals/00145/tocs/01101.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Sakurai:1998:SCC,
author = "Kouichi Sakurai and Hiroki Shizuya",
title = "A Structural Comparison of the Computational
Difficulty of Breaking Discrete Log Cryptosystems",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "1",
pages = "29--43",
month = "Winter",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 609 469",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n1p29.html;
http://link.springer.de/link/service/journals/00145/bibs/11n1p29.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n1p29.tex;
http://link.springer.de/link/service/journals/00145/tocs/01101.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biham:1998:CMM,
author = "Eli Biham",
title = "Cryptanalysis of Multiple Modes of Operation",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "1",
pages = "45--58",
month = "Winter",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 609 473",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n1p45.html;
http://link.springer.de/link/service/journals/00145/bibs/11n1p45.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n1p45.tex;
http://link.springer.de/link/service/journals/00145/tocs/01101.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Knudsen:1998:AFD,
author = "Lars R. Knudsen and Xuejia Lai and Bart Preneel",
title = "Attacks on Fast Double Block Length Hash Functions",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "1",
pages = "59--72",
month = "Winter",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 609 477",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n1p59.html;
http://link.springer.de/link/service/journals/00145/bibs/11n1p59.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n1p59.tex;
http://link.springer.de/link/service/journals/00145/tocs/01101.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Golic:1998:MCI,
author = "Jovan Dj. Goli{\'c}",
title = "On Matroid Characterization of Ideal Secret Sharing
Schemes",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "2",
pages = "75--86",
month = "Spring",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "98m:94035",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n2p75.html;
http://link.springer.de/link/service/journals/00145/bibs/11n2p75.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n2p75.tex;
http://link.springer.de/link/service/journals/00145/tocs/01102.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Naor:1998:PZK,
author = "Moni Naor and Rafail Ostrovsky and Ramarathnam
Venkatesan and Moti Yung",
title = "Perfect Zero-Knowledge Arguments for {NP} Using Any
One-Way Permutation",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "2",
pages = "87--108",
month = "Spring",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68Q15)",
MRnumber = "1 620 948",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n2p87.html;
http://link.springer.de/link/service/journals/00145/bibs/11n2p87.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n2p87.tex;
http://link.springer.de/link/service/journals/00145/tocs/01102.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Scheidler:1998:PKC,
author = "R. Scheidler",
title = "A Public-Key Cryptosystem Using Purely Cubic Fields",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "2",
pages = "109--124",
month = "Spring",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (11R16 11Txx)",
MRnumber = "1 620 944",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n2p109.html;
http://link.springer.de/link/service/journals/00145/bibs/11n2p109.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n2p109.tex;
http://link.springer.de/link/service/journals/00145/tocs/01102.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Schnorr:1998:BBM,
author = "Claus Peter Schnorr and Serge Vaudenay",
title = "The Black-Box Model for Cryptographic Primitives",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "2",
pages = "125--140",
month = "Spring",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 620 940",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n2p125.html;
http://link.springer.de/link/service/journals/00145/bibs/11n2p125.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n2p125.tex;
http://link.springer.de/link/service/journals/00145/tocs/01102.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Balasubramanian:1998:IEC,
author = "R. Balasubramanian and Neal Koblitz",
title = "The Improbability That an Elliptic Curve Has
Subexponential Discrete Log Problem under the
{Menezes-Okamoto-Vanstone} Algorithm",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "2",
pages = "141--145",
month = "Spring",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (11Gxx)",
MRnumber = "1 620 936",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n2p141.html;
http://link.springer.de/link/service/journals/00145/bibs/11n2p141.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n2p141.tex;
http://link.springer.de/link/service/journals/00145/tocs/01102.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Brandt:1998:ZKA,
author = "J{\o}rgen Brandt and Ivan Damg{\aa}rd and Peter
Landrock and Torben Pedersen",
title = "Zero-Knowledge Authentication Scheme with Secret Key
Exchange",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "3",
pages = "147--159",
month = "Summer",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 633 940",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n3p147.html;
http://link.springer.de/link/service/journals/00145/bibs/11n3p147.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n3p147.tex;
http://link.springer.de/link/service/journals/00145/tocs/01103.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Joux:1998:LRT,
author = "Antoine Joux and Jacques Stern",
title = "Lattice Reduction: a Toolbox for the Cryptanalyst",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "3",
pages = "161--185",
month = "Summer",
year = "1998",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s001459900042",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 633 944",
bibdate = "Wed Aug 11 14:51:51 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n3p161.html;
http://link.springer.de/link/service/journals/00145/bibs/11n3p161.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n3p161.tex;
http://link.springer.de/link/service/journals/00145/tocs/01103.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dwork:1998:EEU,
author = "Cynthia Dwork and Moni Naor",
title = "An Efficient Existentially Unforgeable Signature
Scheme and Its Applications",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "3",
pages = "187--208",
month = "Summer",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 633 948",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n3p187.html;
http://link.springer.de/link/service/journals/00145/bibs/11n3p187.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n3p187.tex;
http://link.springer.de/link/service/journals/00145/tocs/01103.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Damgaard:1998:TKT,
author = "Ivan B. Damg{\aa}rd and Lars R. Knudsen",
title = "Two-Key Triple Encryption",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "3",
pages = "209--218",
month = "Summer",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 633 952",
bibdate = "Sat Nov 21 16:36:38 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n3p209.html;
http://link.springer.de/link/service/journals/00145/bibs/11n3p209.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n3p209.tex;
http://link.springer.de/link/service/journals/00145/tocs/01103.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Muller:1998:FME,
author = "Volker M{\"u}ller",
title = "Fast Multiplication on Elliptic Curves over Small
Fields of Characteristic Two",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "4",
pages = "219--234",
month = "Fall",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n4p219.html;
http://link.springer.de/link/service/journals/00145/bibs/11n4p219.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n4p219.tex;
http://link.springer.de/link/service/journals/00145/tocs/01104.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Murphy:1998:AS,
author = "Sean Murphy",
title = "An Analysis of {SAFER}",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "4",
pages = "235--251",
month = "Fall",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n4p235.html;
http://link.springer.de/link/service/journals/00145/bibs/11n4p235.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n4p235.tex;
http://link.springer.de/link/service/journals/00145/tocs/01104.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dobbertin:1998:CM,
author = "Hans Dobbertin",
title = "Cryptanalysis of {MD4}",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "4",
pages = "253--271",
month = "Fall",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n4p253.html;
http://link.springer.de/link/service/journals/00145/bibs/11n4p253.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n4p253.tex;
http://link.springer.de/link/service/journals/00145/tocs/01104.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Rogaway:1998:SOE,
author = "Phillip Rogaway and Don Coppersmith",
title = "A Software-Optimized Encryption Algorithm",
journal = j-J-CRYPTOLOGY,
volume = "11",
number = "4",
pages = "273--287",
month = "Fall",
year = "1998",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Nov 20 16:50:07 MST 1998",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/11n4p273.html;
http://link.springer.de/link/service/journals/00145/bibs/11n4p273.pdf;
http://link.springer.de/link/service/journals/00145/bibs/11n4p273.tex;
http://link.springer.de/link/service/journals/00145/tocs/01104.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{vanOorschot:1999:PCS,
author = "Paul C. {van Oorschot} and Michael J. Wiener",
title = "Parallel Collision Search with Cryptanalytic
Applications",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "1",
pages = "1--28",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 21 15:25:04 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n1p1.html;
http://link.springer.de/link/service/journals/00145/papers/12n1p1.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n1p1.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Naor:1999:CPP,
author = "Moni Naor and Omer Reingold",
title = "On the Construction of Pseudorandom Permutations:
{Luby-Rackoff} Revisited",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "1",
pages = "29--66",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 21 15:25:04 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n1p29.html;
http://link.springer.de/link/service/journals/00145/papers/12n1p29.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n1p29.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Smart:1999:FDH,
author = "N. P. Smart and S. Siksek",
title = "A Fast {Diffie--Hellman} Protocol in Genus 2",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "1",
pages = "67--73",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 21 15:25:04 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n1p67.html;
http://link.springer.de/link/service/journals/00145/papers/12n1p67.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n1p67.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Halevi:1999:ECS,
author = "Shai Halevi",
title = "Efficient Commitment Schemes with Bounded Sender and
Unbounded Receiver",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "2",
pages = "77--89",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 21 15:25:04 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n2p77.html;
http://link.springer.de/link/service/journals/00145/papers/12n2p77.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n2p77.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Rogaway:1999:BHA,
author = "Phillip Rogaway",
title = "Bucket Hashing and Its Application to Fast Message
Authentication",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "2",
pages = "91--115",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 21 15:25:04 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n2p91.html;
http://link.springer.de/link/service/journals/00145/papers/12n2p91.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n2p91.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bellare:1999:TCA,
author = "Mihir Bellare and Ronald L. Rivest",
title = "Translucent Cryptography --- An Alternative to Key
Escrow, and Its Implementation via Fractional Oblivious
Transfer",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "2",
pages = "117--139",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 21 15:25:04 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n2p117.html;
http://link.springer.de/link/service/journals/00145/papers/12n2p117.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n2p117.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Smart:1999:ECC,
author = "N. P. Smart",
title = "Elliptic Curve Cryptosystems over Small Fields of Odd
Characteristic",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "2",
pages = "141--151",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 21 15:25:04 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n2p141.html;
http://link.springer.de/link/service/journals/00145/papers/12n2p141.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n2p141.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Blundo:1999:FBA,
author = "Carlo Blundo and Alfredo {De Santis} and Kaoru
Kurosawa and Wakaha Ogata",
title = "On a Fallacious Bound for Authentication Codes",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "3",
pages = "155--159",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 03 17:04:28 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n3p155.html;
http://link.springer.de/link/service/journals/00145/papers/12n3p155.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biham:1999:CTM,
author = "Eli Biham",
title = "Cryptanalysis of Triple Modes of Operation",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "3",
pages = "161--184",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 03 17:04:28 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n3p161.html;
http://link.springer.de/link/service/journals/00145/papers/12n3p161.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bernstein:1999:HSR,
author = "Daniel J. Bernstein",
title = "How to Stretch Random Functions: The Security of
Protected Counter Sums",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "3",
pages = "185--192",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 03 17:04:28 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n3p185.html;
http://link.springer.de/link/service/journals/00145/papers/12n3p185.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Smart:1999:DLP,
author = "N. P. Smart",
title = "The Discrete Logarithm Problem on Elliptic Curves of
Trace One",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "3",
pages = "193--196",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 03 17:04:28 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n3p193.html;
http://link.springer.de/link/service/journals/00145/papers/12n3p193.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Burmester:1999:DSF,
author = "Mike Burmester and Yvo G. Desmedt and Toshiya Itoh and
Kouichi Sakurai and Hiroki Shizuya",
title = "Divertible and Subliminal-Free Zero-Knowledge Proofs
for Languages",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "3",
pages = "197--223",
month = "",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 03 17:04:28 1999",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n3p197.html;
http://link.springer.de/link/service/journals/00145/papers/12n3p197.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Quinn:1999:BKD,
author = "Kathleen A. S. Quinn",
title = "Bounds for Key Distribution Patterns",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "4",
pages = "227--239",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/01204.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n4p227.html;
http://link.springer.de/link/service/journals/00145/papers/12n4p227.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n4p227.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Joye:1999:CRB,
author = "Marc Joye and Arjen K. Lenstra and Jean-Jacques
Quisquater",
title = "{Chinese} Remaindering Based Cryptosystems in the
Presence of Faults",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "4",
pages = "241--245",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/01204.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n4p241.html;
http://link.springer.de/link/service/journals/00145/papers/12n4p241.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n4p241.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Shoup:1999:SPI,
author = "Victor Shoup",
title = "On the Security of a Practical Identification Scheme",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "4",
pages = "247--260",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/01204.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n4p247.html;
http://link.springer.de/link/service/journals/00145/papers/12n4p247.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n4p247.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Blundo:1999:CVC,
author = "Carlo Blundo and Alfredo {De Santis} and Douglas R.
Stinson",
title = "On the Contrast in Visual Cryptography Schemes",
journal = j-J-CRYPTOLOGY,
volume = "12",
number = "4",
pages = "261--289",
year = "1999",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/01204.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/12n4p261.html;
http://link.springer.de/link/service/journals/00145/papers/12n4p261.pdf;
http://link.springer.de/link/service/journals/00145/papers/12n4p261.tex",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goldreich:2000:P,
author = "Oded Goldreich",
title = "Preface",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "1",
pages = "1--7",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130001.html;
http://link.springer.de/link/service/journals/00145/papers/0013001/00130001.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Franklin:2000:SCM,
author = "Matthew Franklin and Rebecca N. Wright",
title = "Secure Communication in Minimal Connectivity Models",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "1",
pages = "9--30",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130009.html;
http://link.springer.de/link/service/journals/00145/papers/0013001/00130009.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hirt:2000:PSG,
author = "Martin Hirt and Ueli Maurer",
title = "Player Simulation and General Adversary Structures in
Perfect Multiparty Computation",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "1",
pages = "31--60",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130031.html;
http://link.springer.de/link/service/journals/00145/papers/0013001/00130031.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canetti:2000:MAC,
author = "Ran Canetti and Shai Halevi and Amir Herzberg",
title = "Maintaining Authenticated Communication in the
Presence of Break-Ins",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "1",
pages = "61--105",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130061.html;
http://link.springer.de/link/service/journals/00145/papers/0013001/00130061.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canetti:2000:RVF,
author = "Ran Canetti and Eyal Kushilevitz and Rafail Ostrovsky
and Adi Ros{\'e}n",
title = "Randomness versus Fault-Tolerance",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "1",
pages = "107--142",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130107.html;
http://link.springer.de/link/service/journals/00145/papers/0013001/00130107.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canetti:2000:SCM,
author = "Ran Canetti",
title = "Security and Composition of Multiparty Cryptographic
Protocols",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "1",
pages = "143--202",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130143.html;
http://link.springer.de/link/service/journals/00145/papers/0013001/00130143.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Zbinden:2000:PAQ,
author = "H. Zbinden and N. Gisin and B. Huttner and A. Muller
and W. Tittel",
title = "Practical Aspects of Quantum Cryptographic Key
Distribution",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "2",
pages = "207--220",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130207.html;
http://link.springer.de/link/service/journals/00145/papers/0013002/00130207.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fischlin:2000:SSP,
author = "R. Fischlin and C. P. Schnorr",
title = "Stronger Security Proofs for {RSA} and {Rabin} Bits",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "2",
pages = "221--244",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130221.html;
http://link.springer.de/link/service/journals/00145/papers/0013002/00130221.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Golic:2000:FCA,
author = "Jovan Dj. Golic and Mahmoud Salmasizadeh and Ed
Dawson",
title = "Fast Correlation Attacks on the Summation Generator",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "2",
pages = "245--262",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130245.html;
http://link.springer.de/link/service/journals/00145/papers/0013002/00130245.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Paulus:2000:NPK,
author = "Sachar Paulus and Tsuyoshi Takagi",
title = "A New Public-Key Cryptosystem over a Quadratic Order
with Quadratic Decryption Time",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "2",
pages = "263--272",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "2000k:94037",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130263.html;
http://link.springer.de/link/service/journals/00145/papers/0013002/00130263.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology. The Journal of the
International Association for Cryptologic Research",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gennaro:2000:RES,
author = "Rosario Gennaro and Tal Rabin and Stanislav Jarecki
and Hugo Krawczyk",
title = "Robust and Efficient Sharing of {RSA} Functions",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "2",
pages = "273--300",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130273.html;
http://link.springer.de/link/service/journals/00145/papers/0013002/00130273.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Zhang:2000:MCA,
author = "Muxiang Zhang",
title = "Maximum Correlation Analysis of Nonlinear Combining
Functions in Stream Ciphers",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "3",
pages = "301--314",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10007/;
http://link.springer.de/link/service/journals/00145/contents/00/10007/paper/10007.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Petrank:2000:CMR,
author = "Erez Petrank and Charles Rackoff",
title = "{CBC MAC} for Real-Time Data Sources",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "3",
pages = "315--338",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10009/;
http://link.springer.de/link/service/journals/00145/contents/00/10009/paper/10009.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Coppersmith:2000:PAD,
author = "Don Coppersmith and Igor Shparlinski",
title = "On Polynomial Approximation of the Discrete Logarithm
and the {Diffie--Hellman} Mapping",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "3",
pages = "339--360",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10002/;
http://link.springer.de/link/service/journals/00145/contents/00/10002/paper/10002.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Pointcheval:2000:SAD,
author = "David Pointcheval and Jacques Stern",
title = "Security Arguments for Digital Signatures and Blind
Signatures",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "3",
pages = "361--396",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 9 17:48:14 MDT 2000",
bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10003/;
http://link.springer.de/link/service/journals/00145/contents/00/10003/paper/10003.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gennaro:2000:RBU,
author = "Rosario Gennaro and Tal Rabin and Hugo Krawczyk",
title = "{RSA}-Based Undeniable Signatures",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "4",
pages = "397--416",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Nov 13 16:25:51 MST 2000",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10001/;
http://link.springer.de/link/service/journals/00145/contents/00/10001/paper/10001.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Knudsen:2000:DAS,
author = "Lars R. Knudsen",
title = "A Detailed Analysis of {SAFER} {K}",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "4",
pages = "417--436",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Nov 13 16:25:51 MST 2000",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10004/;
http://link.springer.de/link/service/journals/00145/contents/00/10004/paper/10004.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Pollard:2000:KMD,
author = "J. M. Pollard",
title = "Kangaroos, {Monopoly} and Discrete Logarithms",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "4",
pages = "437--447",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Nov 13 16:25:51 MST 2000",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10010/;
http://link.springer.de/link/service/journals/00145/contents/00/10010/paper/10010.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Boyar:2000:SNI,
author = "Joan Boyar and Ivan Damg{\aa}rd and Ren{\'e} Peralta",
title = "Short Non-Interactive Cryptographic Proofs",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "4",
pages = "449--472",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Nov 13 16:25:51 MST 2000",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10011/;
http://link.springer.de/link/service/journals/00145/contents/00/10011/paper/10011.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jacobson:2000:CDL,
author = "Michael J. {Jacobson, Jr.}",
title = "Computing Discrete Logarithms in Quadratic Orders",
journal = j-J-CRYPTOLOGY,
volume = "13",
number = "4",
pages = "473--492",
year = "2000",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Nov 13 16:25:51 MST 2000",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10013/;
http://link.springer.de/link/service/journals/00145/contents/00/10013/paper/10013.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Klapper:2001:ESK,
author = "Andrew Klapper",
title = "On the Existence of Secure Keystream Generators",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "1",
pages = "1--15",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10014/;
http://link.springer.de/link/service/journals/00145/contents/00/10014/paper/10014.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kilian:2001:HPA,
author = "Joe Kilian and Phillip Rogaway",
title = "How to Protect {DES} Against Exhaustive Key Search (an
Analysis of {DESX})",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "1",
pages = "17--35",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10015/;
http://link.springer.de/link/service/journals/00145/contents/00/10015/paper/10015.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{DiCrescenzo:2001:USP,
author = "Giovanni {Di Crescenzo} and Yuval Ishai and Rafail
Ostrovsky",
title = "Universal Service-Providers for Private Information
Retrieval",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "1",
pages = "37--74",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10008/;
http://link.springer.de/link/service/journals/00145/contents/00/10008/paper/10008.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Coppersmith:2001:WQS,
author = "Don Coppersmith",
title = "Weakness in Quaternion Signatures",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "2",
pages = "77--85",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10006/;
http://link.springer.de/link/service/journals/00145/contents/00/10006/paper/10006.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Vaudenay:2001:CCR,
author = "Serge Vaudenay",
title = "Cryptanalysis of the {Chor--Rivest} Cryptosystem",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "2",
pages = "87--100",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "2002e:94103",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10005/;
http://link.springer.de/link/service/journals/00145/contents/00/10005/paper/10005.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Boneh:2001:IEE,
author = "Dan Boneh and Richard A. DeMillo and Richard J.
Lipton",
title = "On the Importance of Eliminating Errors in
Cryptographic Computations",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "2",
pages = "101--119",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10016/;
http://link.springer.de/link/service/journals/00145/contents/00/10016/paper/10016.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Wang:2001:SCM,
author = "Yongge Wang and Yvo Desmedt",
title = "Secure Communication in Multicast Channels: The Answer
to {Franklin} and {Wright}'s Question",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "2",
pages = "121--135",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0002/;
http://link.springer.de/link/service/journals/00145/contents/01/0002/paper/0002.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ye:2001:DAA,
author = "Dingfeng Ye and Zongduo Dai and Kwok-Yan Lam",
title = "Decomposing Attacks on Asymmetric Cryptography Based
on Mapping Compositions",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "2",
pages = "137--150",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0001/;
http://link.springer.de/link/service/journals/00145/contents/01/0001/paper/0001.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bailey:2001:EAF,
author = "Daniel V. Bailey and Christof Paar",
title = "Efficient Arithmetic in Finite Field Extensions with
Application in Elliptic Curve Cryptography",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "3",
pages = "153--176",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/00/10012/;
http://link.springer.de/link/service/journals/00145/contents/00/10012/paper/10012.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goldmann:2001:CBG,
author = "Mikael Goldmann and Mats N{\"a}slund and Alexander
Russell",
title = "Complexity Bounds on General Hard-Core Predicates",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "3",
pages = "177--195",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0007/;
http://link.springer.de/link/service/journals/00145/contents/01/0007/paper/0007.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jakobsen:2001:ABC,
author = "Thomas Jakobsen and Lars R. Knudsen",
title = "Attacks on Block Ciphers of Low Algebraic Degree",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "3",
pages = "197--210",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0003/;
http://link.springer.de/link/service/journals/00145/contents/01/0003/paper/0003.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fiat:2001:DTT,
author = "Amos Fiat and Tamir Tassa",
title = "Dynamic Traitor Tracing",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "3",
pages = "211--223",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 18 07:11:09 MDT 2001",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0006/;
http://link.springer.de/link/service/journals/00145/contents/01/0006/paper/0006.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Scanlon:2001:PKC,
author = "Thomas Scanlon",
title = "Public Key Cryptosystems Based on {Drinfeld} Modules
Are Insecure",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "4",
pages = "225--230",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Feb 23 09:02:29 MST 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014004.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0004/;
http://link.springer.de/link/service/journals/00145/contents/01/0004/paper/0004.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kurosawa:2001:AWI,
author = "Kaoru Kurosawa and Thomas Johansson and Douglas R.
Stinson",
title = "Almost $k$-Wise Independent Sample Spaces and Their
Cryptologic Applications",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "4",
pages = "231--253",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Feb 23 09:02:29 MST 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014004.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0010/;
http://link.springer.de/link/service/journals/00145/contents/01/0010/paper/0010.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lenstra:2001:SCK,
author = "Arjen K. Lenstra and Eric R. Verheul",
title = "Selecting Cryptographic Key Sizes",
journal = j-J-CRYPTOLOGY,
volume = "14",
number = "4",
pages = "255--293",
year = "2001",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Feb 23 09:02:29 MST 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014004.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0009/;
http://link.springer.de/link/service/journals/00145/contents/01/0009/paper/0009.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Micali:2002:IES,
author = "Silvio Micali and Leonid Reyzin",
title = "Improving the Exact Security of Digital Signature
Schemes",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "1",
pages = "1--18",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Feb 23 09:05:18 MST 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0005/;
http://link.springer.de/link/service/journals/00145/contents/01/0005/paper/0005.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gaudry:2002:CDF,
author = "P. Gaudry and F. Hess and N. P. Smart",
title = "Constructive and Destructive Facets of {Weil} Descent
on Elliptic Curves",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "1",
pages = "19--46",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Feb 23 09:05:18 MST 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0011/;
http://link.springer.de/link/service/journals/00145/contents/01/0011/paper/0011.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biham:2002:CAX,
author = "Eli Biham and Lars R. Knudsen",
title = "Cryptanalysis of the {ANSI X9.52 CBCM} Mode",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "1",
pages = "47--59",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60",
MRnumber = "1 880 934",
bibdate = "Sat Feb 23 09:05:18 MST 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0016/;
http://link.springer.de/link/service/journals/00145/contents/01/0016/paper/0016.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Moldovyan:2002:CBD,
author = "A. A. Moldovyan and N. A. Moldovyan",
title = "A Cipher Based on Data-Dependent Permutations",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "1",
pages = "61--72",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Feb 23 09:05:18 MST 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015001.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0012/;
http://link.springer.de/link/service/journals/00145/contents/01/0012/paper/0012.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Shoup:2002:STC,
author = "Victor Shoup and Rosario Gennaro",
title = "Securing Threshold Cryptosystems against Chosen
Ciphertext Attack",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "2",
pages = "75--96",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 20 14:17:21 MDT 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0020/;
http://link.springer.de/link/service/journals/00145/contents/01/0020/paper/0020.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Naor:2002:CPR,
author = "Moni Naor and Omer Reingold",
title = "Constructing Pseudo-Random Permutations with a
Prescribed Structure",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "2",
pages = "97--102",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 20 14:17:21 MDT 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0008/;
http://link.springer.de/link/service/journals/00145/contents/01/0008/paper/0008.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abadi:2002:RTV,
author = "Mart{\'\i}n Abadi and Phillip Rogaway",
title = "Reconciling Two Views of Cryptography (The
Computational Soundness of Formal Encryption)",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "2",
pages = "103--127",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (68Qxx)",
MRnumber = "1 903 446",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
MathSciNet database",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0014/;
http://link.springer.de/link/service/journals/00145/contents/01/0014/paper/0014.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology. The Journal of the
International Association for Cryptologic Research",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Galbraith:2002:ECP,
author = "Steven D. Galbraith",
title = "Elliptic Curve {Paillier} Schemes",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "2",
pages = "129--138",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 20 14:17:21 MDT 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0015/;
http://link.springer.de/link/service/journals/00145/contents/01/0015/paper/0015.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Johnston:2002:AKE,
author = "Anna M. Johnston and Peter S. Gemmell",
title = "Authenticated Key Exchange Provably Secure Against the
Man-in-the-Middle Attack",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "2",
pages = "139--148",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 20 14:17:21 MDT 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0017/;
http://link.springer.de/link/service/journals/00145/contents/01/0017/paper/0017.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Nguyen:2002:IDS,
author = "Phong Q. Nguyen and Igor E. Shparlinski",
title = "The Insecurity of the {Digital Signature Algorithm}
with Partially Known Nonces",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "3",
pages = "151--176",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 16 07:13:07 MDT 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/02/0021/index.html;
http://link.springer.de/link/service/journals/00145/contents/02/0021/paper/s00145-002-0021-3.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2002:PPD,
author = "Yehuda Lindell and Benny Pinkas",
title = "Privacy Preserving Data Mining",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "3",
pages = "177--206",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 16 07:13:07 MDT 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/01/0019/index.html;
http://link.springer.de/link/service/journals/00145/contents/01/0019/paper/s00145-001-0019-2.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Knudsen:2002:SFC,
author = "Lars R. Knudsen",
title = "The Security of {Feistel} Ciphers with Six Rounds or
Less",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "3",
pages = "207--222",
year = "2002",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 16 07:13:07 MDT 2002",
bibsource = "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015003.html;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.de/link/service/journals/00145/contents/02/9839/index.html;
http://link.springer.de/link/service/journals/00145/contents/02/9839/paper/s00145-002-9839-y.pdf",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Shoup:2002:OR,
author = "Victor Shoup",
title = "{OAEP} Reconsidered",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "4",
pages = "223--249",
month = sep,
year = "2002",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0133-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:13 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Bellare and Rogaway; Chosen ciphertext security,
Random oracle model; OAEP encryption scheme; Public-key
encryption",
}
@Article{Catalano:2002:PTF,
author = "Dario Catalano and Rosario Gennaro and Nick
Howgrave-Graham",
title = "{Paillier}'s Trapdoor Function Hides up to {$O(n)$}
Bits",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "4",
pages = "251--269",
month = sep,
year = "2002",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0112-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:13 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bellare:2002:NNF,
author = "Mihir Bellare",
title = "A Note on Negligible Functions",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "4",
pages = "271--284",
month = sep,
year = "2002",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0116-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:13 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Magliveras:2002:NAD,
author = "S. S. Magliveras and D. R. Stinson and Tran van
Trung",
title = "New Approaches to Designing Public Key Cryptosystems
Using One-Way Functions and Trapdoors in Finite
Groups",
journal = j-J-CRYPTOLOGY,
volume = "15",
number = "4",
pages = "285--297",
month = sep,
year = "2002",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-001-0018-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:13 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Myers:2003:EAS,
author = "Steven Myers",
title = "Efficient Amplification of the Security of Weak
Pseudo-Random Function Generators",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "1",
pages = "1--24",
month = jan,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0007-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:14 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beimel:2003:BAM,
author = "Amos Beimel and Shlomi Dolev",
title = "Buses for Anonymous Message Delivery",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "1",
pages = "25--39",
month = jan,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0128-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:14 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Golic:2003:EPC,
author = "Jovan Dj. Golic and Renato Menicocci",
title = "Edit Probability Correlation Attacks on Stop\slash Go
Clocked Keystream Generators",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "1",
pages = "41--68",
month = jan,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-9925-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:14 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goldreich:2003:SME,
author = "Oded Goldreich and Vered Rosen",
title = "On the Security of Modular Exponentiation with
Application to the Construction of Pseudorandom
Generators",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "2",
pages = "71--93",
month = mar,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0038-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:14 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ben-Or:2003:THI,
author = "Michael Ben-Or and Dan Gutfreund",
title = "Trading Help for Interaction in Statistical
Zero-Knowledge Proofs",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "2",
pages = "95--116",
month = mar,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0113-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:14 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Muller:2003:PPT,
author = "Siguna M{\"u}ller",
title = "A Probable Prime Test with Very High Confidence for
{$n L 3 \bmod 4$}",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "2",
pages = "117--139",
month = mar,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0107-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:14 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
abstract = "The workhorse of most compositeness tests is
Miller--Rabin, which works very fast in practice, but
may fail for one-quarter of all bases. We present an
alternative method to decide quickly whether a large
number $n$ is composite or probably prime. Our
algorithm is both based on the ideas of Pomerance,
Baillie, Selfridge, and Wagstaff, and on a suitable
combination of square, third, and fourth root testing
conditions. A composite number $n L 3 \bmod 4$ will
pass our test with probability less than 1/331,000, in
the worst case. For most numbers, the failure rate is
even smaller. Depending on the respective residue
classes $n$ modulo $3$ and $8$, we prove a worst-case
failure rate of less than $1/5,300,000$, $1/480,000$,
and $1/331,000$, respectively, for any iteration of our
test. Along with some fixed precomputation, our test
has running time about three times the time as for the
Miller--Rabin test. Implementation can be achieved very
efficiently by naive arithmetic only.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2003:PCT,
author = "Yehuda Lindell",
title = "Parallel Coin-Tossing and Constant-Round Secure
Two-Party Computation",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "3",
pages = "143--184",
month = jun,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0143-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:15 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bellare:2003:OMR,
author = "M. Bellare and C. Namprempre and D. Pointcheval and M.
Semanko",
title = "The One-More-{RSA}-Inversion Problems and the Security
of {Chaum}'s Blind Signature Scheme",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "3",
pages = "185--215",
month = jun,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0120-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Nov 5 18:22:15 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Brassard:2003:OTP,
author = "Gilles Brassard and Claude Cr{\'e}peau and Stefan
Wolf",
title = "Oblivious Transfers and Privacy Amplification",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "4",
pages = "219--237",
month = sep,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0146-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Dec 11 06:01:25 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Joux:2003:SDD,
author = "Antoine Joux and Kim Nguyen",
title = "Separating Decision {Diffie--Hellman} from
Computational {Diffie--Hellman} in Cryptographic
Groups",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "4",
pages = "239--247",
month = sep,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-003-0052-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Dec 11 06:01:25 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Vaudenay:2003:DTB,
author = "Serge Vaudenay",
title = "Decorrelation: a Theory for Block Cipher Security",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "4",
pages = "249--286",
month = sep,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-003-0220-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Dec 11 06:01:25 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kalai:2003:GRF,
author = "Adam Kalai",
title = "Generating Random Factored Numbers, Easily",
journal = j-J-CRYPTOLOGY,
volume = "16",
number = "4",
pages = "287--289",
month = sep,
year = "2003",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-003-0051-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Dec 11 06:01:25 MST 2003",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://people.cs.uchicago.edu/~kalai/factor/factor.html",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goldreich:2004:P,
author = "Oded Goldreich",
title = "Preface",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "1",
pages = "1--3",
month = jan,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-003-1701-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Aug 3 15:21:45 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dziembowski:2004:ORE,
author = "Stefan Dziembowski and Ueli Maurer",
title = "Optimal Randomizer Efficiency in the Bounded-Storage
Model",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "1",
pages = "5--26",
month = jan,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-003-0309-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Aug 3 15:21:45 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lu:2004:EAS,
author = "Chi-Jen Lu",
title = "Encryption against Storage-Bounded Adversaries from
On-Line Strong Extractors",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "1",
pages = "27--42",
month = jan,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-003-0217-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Aug 3 15:21:45 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Vadhan:2004:CLC,
author = "Salil P. Vadhan",
title = "Constructing Locally Computable Extractors and
Cryptosystems in the Bounded-Storage Model",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "1",
pages = "43--77",
month = jan,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-003-0237-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Aug 3 15:21:45 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fujisaki:2004:ROS,
author = "Eiichiro Fujisaki and Tatsuaki Okamoto and David
Pointcheval and Jacques Stern",
title = "{RSA-OAEP} Is Secure under the {RSA} Assumption",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "2",
pages = "81--104",
month = mar,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-002-0204-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Aug 3 15:21:45 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Wiener:2004:FCC,
author = "Michael J. Wiener",
title = "The Full Cost of Cryptanalytic Attacks",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "2",
pages = "105--124",
month = mar,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-003-0213-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Aug 3 15:21:45 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beimel:2004:RSC,
author = "Amos Beimel and Yuval Ishai and Tal Malkin",
title = "Reducing the Servers --- Computation in {Private
Information Retrieval}: {PIR} with Preprocessing",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "2",
pages = "125--151",
month = mar,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0134-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Aug 3 15:21:45 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canetti:2004:AVN,
author = "Ran Canetti and Ivan Damg{\aa}rd and Stefan
Dziembowski and Yuval Ishai and Tal Malkin",
title = "Adaptive versus Non-Adaptive Security of Multi-Party
Protocols",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "3",
pages = "153--207",
month = jun,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0135-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Aug 3 15:21:45 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hast:2004:NOS,
author = "Gustav Hast",
title = "Nearly One-Sided Tests and the {Goldreich--Levin}
Predicate",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "3",
pages = "209--229",
month = jun,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-003-0141-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Aug 3 15:21:45 MDT 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lenstra:2004:P,
author = "Arjen K. Lenstra",
title = "Preface",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "4",
pages = "233--233",
month = sep,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-1704-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:13 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=233",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Miller:2004:WPE,
author = "Victor S. Miller",
title = "The {Weil} Pairing, and Its Efficient Calculation",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "4",
pages = "235--261",
month = sep,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0315-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:13 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=235",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Joux:2004:ORP,
author = "Antoine Joux",
title = "A One Round Protocol for Tripartite
{Diffie--Hellman}",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "4",
pages = "263--276",
month = sep,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0312-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:13 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=263",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Verheul:2004:EXM,
author = "Eric R. Verheul",
title = "Evidence that {XTR} Is More Secure than Supersingular
Elliptic Curve Cryptosystems",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "4",
pages = "277--296",
month = sep,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0313-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:13 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=277",
abstract = "We show that finding an efficiently computable
injective homomorphism from the XTR subgroup into the
group of points over $\mathrm{GF}(p^2)$ of a particular
type of supersingular elliptic curve is at least as
hard as solving the Diffie--Hellman problem in the XTR
subgroup. This provides strong evidence for a negative
answer to the question posed by Vanstone and Menezes at
the Crypto 2000 Rump Session on the possibility of
efficiently inverting the MOV embedding into the XTR
subgroup. As a side result we show that the Decision
Diffie--Hellman problem in the group of points on this
type of supersingular elliptic curves is efficiently
computable, which provides an example of a group where
the Decision Diffie--Hellman problem is simple, while
the Diffie--Hellman and discrete logarithm problems are
presumably not. So-called distortion maps on groups of
points on elliptic curves that play an important role
in our cryptanalysis also lead to cryptographic
applications of independent interest. These
applications are an improvement of Joux's one round
protocol for tripartite Diffie--Hellman key exchange
and a non-refutable digital signature scheme that
supports escrowable encryption. We also discuss the
applicability of our methods to general elliptic curves
defined over finite fields which includes a
classification of elliptic curve groups where
distortion maps exist.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Decision Diffie--Hellman problem; Escrow; Inverting
MOV embedding; Supersingular elliptic curves;
Tripartite Diffie--Hellman key exchange; XTR",
}
@Article{Boneh:2004:SSW,
author = "Dan Boneh and Ben Lynn and Hovav Shacham",
title = "Short Signatures from the {Weil} Pairing",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "4",
pages = "297--319",
month = sep,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0314-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:13 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=297",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Barreto:2004:EIP,
author = "Paulo S. L. M. Barreto and Ben Lynn and Michael
Scott",
title = "Efficient Implementation of Pairing-Based
Cryptosystems",
journal = j-J-CRYPTOLOGY,
volume = "17",
number = "4",
pages = "321--334",
month = sep,
year = "2004",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0311-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:13 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=321",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Naor:2005:CSO,
author = "Moni Naor and Benny Pinkas",
title = "Computationally Secure Oblivious Transfer",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "1",
pages = "1--35",
month = jan,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0102-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:13 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=1&spage=1",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fitzi:2005:MCP,
author = "Matthias Fitzi and Juan A. Garay and Ueli Maurer and
others",
title = "Minimal Complete Primitives for Secure Multi-Party
Computation",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "1",
pages = "37--61",
month = jan,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0150-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:13 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=1&spage=37",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cohen:2005:ASW,
author = "Henri Cohen",
title = "Analysis of the Sliding Window Powering Algorithm",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "1",
pages = "63--76",
month = jan,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0218-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:13 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=1&spage=63",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dupont:2005:BCA,
author = "R{\'e}gis Dupont and Andreas Enge and Fran{\c{c}}ois
Morain",
title = "Building Curves with Arbitrary Small {MOV} Degree over
Finite Prime Fields",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "2",
pages = "79--89",
month = apr,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0219-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:14 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=79",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gennaro:2005:IPR,
author = "Rosario Gennaro",
title = "An Improved Pseudo-Random Generator Based on the
Discrete Logarithm Problem",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "2",
pages = "91--110",
month = apr,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0215-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:14 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=91",
abstract = "Under the assumption that solving the discrete
logarithm problem modulo an $n$-bit safe prime $p$ is
hard even when the exponent is a small $c$-bit number,
we construct a new pseudo-random bit generator. This
new generator outputs $n - c - 1$ bits per
exponentiation with a $c$-bit exponent and is among the
fastest generators based on hard number-theoretic
problems.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Black:2005:CMA,
author = "John Black and Phillip Rogaway",
title = "{CBC MACs} for Arbitrary-Length Messages: The
Three-Key Constructions",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "2",
pages = "111--131",
month = apr,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0016-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:14 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=111",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lo:2005:EQK,
author = "Hoi-Kwong Lo and H. F. Chau and M. Ardehali",
title = "Efficient Quantum Key Distribution Scheme and a Proof
of Its Unconditional Security",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "2",
pages = "133--165",
month = apr,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0142-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:14 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=133",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Tassa:2005:LBD,
author = "Tamir Tassa",
title = "Low Bandwidth Dynamic Traitor Tracing Schemes",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "2",
pages = "167--183",
month = apr,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0214-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jul 5 06:57:14 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=167",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canetti:2005:P,
author = "Ran Canetti",
title = "Preface",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "3",
pages = "187--189",
month = jul,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-1803-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=3&spage=187",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Considine:2005:BAG,
author = "Jeffrey Considine and Matthias Fitzi and Matthew
Franklin and Leonid A. Levin and Ueli Maurer and David
Metcalf",
title = "{Byzantine} Agreement Given Partial Broadcast",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "3",
pages = "191--217",
month = jul,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0308-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=3&spage=191",
abstract = "This paper considers unconditionally secure protocols
for reliable broadcast among a set of $n$ players,
where up to $t$ of the players can be corrupted by a
(Byzantine) adversary but the remaining $h = n - t$
players remain honest. In the standard model with a
complete, synchronous network of bilateral
authenticated communication channels among the players,
broadcast is achievable if and only if $2n/h < 3$. We
show that, by extending this model by the existence of
partial broadcast channels among subsets of $b$
players, global broadcast can be achieved if and only
if the number $h$ of honest players satisfies $2n/h < b
+ 1$. Achievability is demonstrated by protocols with
communication and computation complexities polynomial
in the size of the network, i.e., in the number of
partial broadcast channels. A respective
characterization for the related consensus problem is
also given.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Broadcast; Byzantine agreement",
}
@Article{Cachin:2005:ROC,
author = "Christian Cachin and Klaus Kursawe and Victor Shoup",
title = "Random Oracles in {Constantinople}: Practical
Asynchronous {Byzantine} Agreement Using Cryptography",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "3",
pages = "219--246",
month = jul,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0318-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=3&spage=219",
abstract = "Byzantine agreement requires a set of parties in a
distributed system to agree on a value even if some
parties are maliciously misbehaving. A new protocol for
Byzantine agreement in a completely asynchronous
network is presented that makes use of new
cryptographic protocols, specifically protocols for
threshold signatures and coin-tossing. These
cryptographic protocols have practical and provably
secure implementations in the random oracle model. In
particular, a coin-tossing protocol based on the
Diffie--Hellman problem is presented and analyzed. The
resulting asynchronous Byzantine agreement protocol is
both practical and theoretically optimal because it
tolerates the maximum number of corrupted parties, runs
in constant expected rounds, has message and
communication complexity close to the optimum, and uses
a trusted dealer only once in a setup phase, after
which it can process a virtually unlimited number of
transactions. The protocol is formulated as a
transaction processing service in a cryptographic
security model, which differs from the standard
information-theoretic formalization and may be of
independent interest.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Asynchronous consensus; Byzantine faults;
Cryptographic common coin; Dual-threshold schemes;
Threshold signatures",
}
@Article{Goldwasser:2005:SMP,
author = "Shafi Goldwasser and Yehuda Lindell",
title = "Secure Multi-Party Computation without Agreement",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "3",
pages = "247--287",
month = jul,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0319-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=3&spage=247",
abstract = "It has recently been shown that authenticated
Byzantine agreement, in which more than a third of the
parties are corrupted, cannot be securely realized
under concurrent or parallel (stateless) composition.
This result puts into question any usage of
authenticated Byzantine agreement in a setting where
many executions take place. In particular, this is true
for the whole body of work of secure multi-party
protocols in the case that a third or more of the
parties are corrupted. This is because these protocols
strongly rely on the extensive use of a broadcast
channel, which is in turn realized using authenticated
Byzantine agreement. We remark that it was accepted
folklore that the use of a broadcast channel (or
authenticated Byzantine agreement) is actually
essential for achieving meaningful secure multi-party
computation whenever a third or more of the parties are
corrupted. In this paper we show that this folklore is
false. We present a mild relaxation of the definition
of secure computation allowing abort. Our new
definition captures all the central security issues of
secure computation, including privacy, correctness and
independence of inputs. However, the novelty of the
definition is in decoupling the issue of agreement from
these issues. We then show that this relaxation
suffices for achieving secure computation in a
point-to-point network. That is, we show that secure
multi-party computation for this definition can be
achieved for any number of corrupted parties and
without a broadcast channel (or trusted pre-processing
phase as required for running authenticated Byzantine
agreement). Furthermore, this is achieved by just
replacing the broadcast channel in known protocols with
a very simple and efficient echo-broadcast protocol. An
important corollary of our result is the ability to
obtain multi-party protocols that remain secure under
composition, without assuming a broadcast channel.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Broadcast; Protocol composition; Secure multi-party
computation",
}
@Article{Biham:2005:CSR,
author = "Eli Biham and Alex Biryukov and Adi Shamir",
title = "Cryptanalysis of {Skipjack} Reduced to $31$ Rounds
Using Impossible Differentials",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "4",
pages = "291--311",
month = sep,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0129-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=291",
abstract = "In this paper we present a cryptanalytic technique,
based on impossible differentials. We use it to show
that recovering keys of Skipjack reduced from $32$ to
$31$ rounds can be performed faster than exhaustive
search. We also describe the Yoyo game (a tool that can
be used against reduced-round Skipjack), and other
properties of Skipjack.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Adaptive attacks; Cryptanalysis; Differential
cryptanalysis; Impossible differentials; Skipjack; Yoyo
game",
}
@Article{Kent:2005:SCB,
author = "Adrian Kent",
title = "Secure Classical Bit Commitment Using Fixed Capacity
Communication Channels",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "4",
pages = "313--335",
month = sep,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0905-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=313",
abstract = "If mutually mistrustful parties A and B control two or
more appropriately located sites, special relativity
can be used to guarantee that a pair of messages
exchanged by A and B are independent. In earlier work
we used this fact to define a relativistic bit
commitment protocol, RBC1, in which security is
maintained by exchanging a sequence of messages whose
transmission rate increases exponentially in time. We
define here a new relativistic protocol, RBC2, which
requires only a constant transmission rate and could be
practically implemented. We prove that RBC2 allows a
bit commitment to be indefinitely maintained with
unconditional security against all classical attacks.
We examine its security against quantum attacks, and
show that it is immune from the class of attacks shown
by Mayers and Lo--Chau to render non-relativistic
quantum bit commitment protocols insecure.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Bit commitment; Quantum cryptography; Relativistic
cryptography",
}
@Article{vonzurGathen:2005:PNB,
author = "Joachim von zur Gathen and Michael N{\"o}cker",
title = "Polynomial and Normal Bases for Finite Fields",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "4",
pages = "337--355",
month = sep,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0221-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=337",
abstract = "We discuss two different ways to speed up
exponentiation in nonprime finite fields: on the one
hand, reduction of the total number of operations, and
on the other hand, fast computation of a single
operation. Two data structures are particularly useful:
sparse irreducible polynomials and normal bases. We
report on implementation results for our methods.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Avanzi:2005:CCM,
author = "Roberto M. Avanzi",
title = "The Complexity of Certain Multi-Exponentiation
Techniques in Cryptography",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "4",
pages = "357--373",
month = sep,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0229-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=357",
abstract = "We describe, analyze and compare some combinations of
multi-exponentiation algorithms with representations of
the exponents. We are especially interested in the case
where the inversion of group elements is fast: this is
true for example for elliptic curves, groups of
rational divisor classes of hyperelliptic curves, trace
zero varieties and XTR. The methods can also be used
for computing single exponentiations in groups which
admit an appropriate automorphism satisfying a monic
equation of small degree over the integers.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Elliptic and hyperelliptic curves; Exponentiation;
Groups with automorphisms; Integer recoding; Scalar
multiplication; Trace zero varieties; XTR",
}
@Article{Knudsen:2005:PKR,
author = "Lars R. Knudsen and Chris J. Mitchell",
title = "Partial Key Recovery Attack Against {RMAC}",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "4",
pages = "375--389",
month = sep,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0324-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=375",
abstract = "In this paper new ``partial'' key recovery attacks
against the RMAC block cipher based Message
Authentication Code scheme are described. That is we
describe attacks that, in some cases, recover one of
the two RMAC keys much more efficiently than previously
described attacks. Although all attacks, but one, are
of no major threat in practice, in some cases there is
reason for concern. In particular, the recovery of the
second RMAC key (of $k$ bits) may only require around
$2^{k/2}$ block cipher operations (encryptions or
decryptions). The RMAC implementation using triple DES
proposed by NIST is shown to be very weak.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "AES; Message Authentication Codes; RMAC; Triple DES",
}
@Article{Blundo:2005:ADD,
author = "Carlo Blundo and Paolo D'Arco",
title = "Analysis and Design of Distributed Key Distribution
Centers",
journal = j-J-CRYPTOLOGY,
volume = "18",
number = "4",
pages = "391--414",
month = sep,
year = "2005",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0407-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Oct 4 05:21:04 MDT 2005",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=391",
abstract = "A Key Distribution Center of a network is a server who
generates and distributes secret keys to groups of
users for secure communication. A Distributed Key
Distribution Center is a set of servers that jointly
realizes a Key Distribution Center. In this paper we
describe in terms of information theory a model for
Distributed Key Distribution Centers, and we present
lower bounds holding in the model for the main
resources needed to set up and manage a distributed
center, i.e., memory storage, randomness, and
bandwidth. Then we show that a previously proposed
protocol which uses a bidimensional extension of
Shamir's secret sharing scheme meets the bounds and is,
hence, optimal.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Cryptographic protocols; Distributed systems; Key
establishment",
}
@Article{Denef:2006:EKA,
author = "Jan Denef and Frederik Vercauteren",
title = "An Extension of {Kedlaya}'s Algorithm to Hyperelliptic
Curves in Characteristic $2$",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "1",
pages = "1--25",
month = jan,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0231-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:45 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=1",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Cryptography; Hyperelliptic curves; Kedlaya's
algorithm; Monsky-Washnitzer cohomology",
}
@Article{MacKenzie:2006:TPA,
author = "Philip MacKenzie and Thomas Shrimpton and Markus
Jakobsson",
title = "Threshold Password-Authenticated Key Exchange",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "1",
pages = "27--66",
month = jan,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0232-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:45 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=27",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Dictionary attack; Key exchange; Password
authentication; Threshold cryptosystems",
}
@Article{Katz:2006:CSN,
author = "Jonathan Katz and Moti Yung",
title = "Characterization of Security Notions for Probabilistic
Private-Key Encryption",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "1",
pages = "67--95",
month = jan,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0310-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:45 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=67",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Definitions; Private-key encryptions",
}
@Article{Chang:2006:IBO,
author = "Yan-Cheng Chang and Chun-Yuan Hsiao and Chi-Jen Lu",
title = "The Impossibility of Basing One-Way Permutations on
Central Cryptographic Primitives",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "1",
pages = "97--114",
month = jan,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0317-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:45 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=97",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Black-box reductions; Cryptographic primitives;
One-way permutations; Private information retrieval;
Trapdoor functions",
}
@Article{Teske:2006:ECT,
author = "Edlyn Teske",
title = "An Elliptic Curve Trapdoor System",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "1",
pages = "115--133",
month = jan,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-004-0328-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:45 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=115",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Elliptic curve cryptography; Isogenies; Key escrow;
Trapdoor functions; Weil descent",
}
@Article{Canetti:2006:LUC,
author = "Ran Canetti and Eyal Kushilevitz and Yehuda Lindell",
title = "On the Limitations of Universally Composable Two-Party
Computation Without Set-Up Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "2",
pages = "135--167",
month = apr,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0419-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:50 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=2&spage=135",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Impossibility results; Secure two-party computation;
Universal composability",
}
@Article{Garay:2006:SZK,
author = "Juan A. Garay and Philip MacKenzie and Ke Yang",
title = "Strengthening Zero-Knowledge Protocols Using
Signatures",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "2",
pages = "169--209",
month = apr,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0307-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:50 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=2&spage=169",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Non-malleability; Signatures; Simulation soundness;
Zero knowledge",
}
@Article{Jacobson:2006:IRQ,
author = "Michael J. Jacobson and Renate Scheidler and Hugh C.
Williams",
title = "An Improved Real-Quadratic-Field-Based Key Exchange
Procedure",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "2",
pages = "211--239",
month = apr,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0357-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:50 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=2&spage=211",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Cryptographic key exchange; NUCOMP; Real quadratic
field; Reduced principal ideal",
}
@Article{Goldreich:2006:SKG,
author = "Oded Goldreich and Yehuda Lindell",
title = "Session-Key Generation Using Human Passwords Only",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "3",
pages = "241--340",
month = jul,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0233-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:53 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=3&spage=241",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Blaser:2006:PCC,
author = "Markus Bl{\"a}ser and Andreas Jakoby and Maciej
Liskiewicz and Bodo Manthey",
title = "Private Computation: $k$-Connected versus
$1$-Connected Networks",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "3",
pages = "341--357",
month = jul,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0329-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:53 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=3&spage=341",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Connectivity; Parity; Private computation; Randomness;
Secure function evaluation; Secure multi-party
computation",
}
@Article{Lindell:2006:SCC,
author = "Yehuda Lindell",
title = "A Simpler Construction of {CCA2}-Secure Public-Key
Encryption under General Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "3",
pages = "359--377",
month = jul,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0345-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:53 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=3&spage=359",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Adaptive chosen-ciphertext attacks; Public-key
encryption; Simulation-sound non-interactive
zero-knowledge",
}
@Article{Biham:2006:PSQ,
author = "Eli Biham and Michel Boyer and P. Oscar Boykin and Tal
Mor and Vwani Roychowdhury",
title = "A Proof of the Security of Quantum Key Distribution",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "4",
pages = "381--439",
month = oct,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0011-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:56 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=381",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Information versus disturbance; Quantum information;
Quantum key distribution; Quantum security",
}
@Article{Hong:2006:KIK,
author = "Deukjo Hong and Seokhie Hong and Wonil Lee and Sangjin
Lee and Jongin Lim and Jaechul Sung and Okyeon Yi",
title = "Known-{IV}, Known-in-Advance-{IV}, and
Replayed-and-Known-{IV} Attacks on Multiple Modes of
Operation of Block Ciphers",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "4",
pages = "441--462",
month = oct,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0205-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:56 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=441",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Girault:2006:FAS,
author = "Marc Girault and Guillaume Poupard and Jacques Stern",
title = "On the Fly Authentication and Signature Schemes Based
on Groups of Unknown Order",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "4",
pages = "463--487",
month = oct,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0224-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:56 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=463",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Damgard:2006:EQF,
author = "Ivan Bjerre Damgard and Gudmund Skovbjerg Frandsen",
title = "An Extended Quadratic {Frobenius} Primality Test with
Average- and Worst-Case Error Estimate",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "4",
pages = "489--520",
month = oct,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0332-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:56 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=489",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Harnik:2006:CTP,
author = "Danny Harnik and Moni Naor and Omer Reingold and Alon
Rosen",
title = "Completeness in Two-Party Secure Computation: a
Computational View",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "4",
pages = "521--552",
month = oct,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0346-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:56 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=521",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Luca:2006:ECL,
author = "Florian Luca and Igor E. Shparlinski",
title = "Elliptic Curves with Low Embedding Degree",
journal = j-J-CRYPTOLOGY,
volume = "19",
number = "4",
pages = "553--562",
month = oct,
year = "2006",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0544-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:33:56 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=553",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Anonymous:2007:EN,
author = "Anonymous",
title = "{Editor}'s Note",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "1",
pages = "1--1",
month = jan,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-5001-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:01 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=1",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Koblitz:2007:ALS,
author = "Neal Koblitz and Alfred J. Menezes",
title = "Another Look at ``Provable Security''",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "1",
pages = "3--37",
month = jan,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-005-0432-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:01 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=3",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Coron:2007:DPT,
author = "Jean-Sebastien Coron and Alexander May",
title = "Deterministic Polynomial-Time Equivalence of Computing
the {RSA} Secret Key and Factoring",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "1",
pages = "39--50",
month = jan,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0433-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:01 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=39",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gennaro:2007:SDK,
author = "Rosario Gennaro and Stanislaw Jarecki and Hugo
Krawczyk and Tal Rabin",
title = "Secure Distributed Key Generation for Discrete-Log
Based Cryptosystems",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "1",
pages = "51--83",
month = jan,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0347-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:01 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=51",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Katz:2007:SPA,
author = "Jonathan Katz and Moti Yung",
title = "Scalable Protocols for Authenticated Group Key
Exchange",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "1",
pages = "85--113",
month = jan,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0361-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:01 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=85",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Catalano:2007:THI,
author = "Dario Catalano and David Pointcheval and Thomas
Pornin",
title = "Trapdoor Hard-to-Invert Group Isomorphisms and Their
Application to Password-Based Authentication",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "1",
pages = "115--149",
month = jan,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0431-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:01 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=115",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Haastad:2007:SII,
author = "Johan H{\aa}stad",
title = "The Security of the {IAPM} and {IACBC} Modes",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "2",
pages = "153--163",
month = apr,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0225-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:07 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=2&spage=153",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ding:2007:CRO,
author = "Yan Zong Ding and Danny Harnik and Alon Rosen and
Ronen Shaltiel",
title = "Constant-Round Oblivious Transfer in the Bounded
Storage Model",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "2",
pages = "165--202",
month = apr,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0438-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:07 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=2&spage=165",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Baek:2007:FPS,
author = "Joonsang Baek and Ron Steinfeld and Yuliang Zheng",
title = "Formal Proofs for the Security of Signcryption",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "2",
pages = "203--235",
month = apr,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0211-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:07 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=2&spage=203",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Tassa:2007:HTS,
author = "Tamir Tassa",
title = "Hierarchical Threshold Secret Sharing",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "2",
pages = "237--264",
month = apr,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0334-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:07 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=2&spage=237",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canetti:2007:FSP,
author = "Ran Canetti and Shai Halevi and Jonathan Katz",
title = "A Forward-Secure Public-Key Encryption Scheme",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "3",
pages = "265--294",
month = jul,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0442-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:11 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=265",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beimel:2007:RIT,
author = "Amos Beimel and Yoav Stahl",
title = "Robust Information-Theoretic Private Information
Retrieval",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "3",
pages = "295--321",
month = jul,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0424-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:11 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=295",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Blundo:2007:USD,
author = "Carlo Blundo and Paolo D'Arco and Alfredo {De Santis}
and Douglas Stinson",
title = "On Unconditionally Secure Distributed Oblivious
Transfer",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "3",
pages = "323--373",
month = jul,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0327-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:11 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=323",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cheng:2007:PPO,
author = "Qi Cheng",
title = "Primality Proving via One Round in {ECPP} and One
Iteration in {AKS}",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "3",
pages = "375--387",
month = jul,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-006-0406-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:11 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=375",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Tsaban:2007:TCK,
author = "Boaz Tsaban",
title = "Theoretical Cryptanalysis of the {Klimov--Shamir}
Number Generator {TF-1}",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "3",
pages = "389--392",
month = jul,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0564-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:11 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=389",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gennaro:2007:RES,
author = "Rosario Gennaro and Tal Rabin and Stanislav Jarecki
and Hugo Krawczyk",
title = "Robust and Efficient Sharing of {RSA} Functions",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "3",
pages = "393--393",
month = jul,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0201-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:11 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=393",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gennaro:2007:RBU,
author = "Rosario Gennaro and Tal Rabin and Hugo Krawczyk",
title = "{RSA}-Based Undeniable Signatures",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "3",
pages = "394--394",
month = jul,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0202-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:11 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=394",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abadi:2007:RTV,
author = "Martin Abadi and Phillip Rogaway",
title = "Reconciling Two Views of Cryptography (The
Computational Soundness of Formal Encryption)",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "3",
pages = "395--395",
month = jul,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0203-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:11 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=395",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ostrovsky:2007:PSS,
author = "Rafail Ostrovsky and William E. Skeith",
title = "Private Searching on Streaming Data",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "4",
pages = "397--430",
month = oct,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0565-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:44 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=4&spage=397",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kalai:2007:CCS,
author = "Yael Tauman Kalai and Yehuda Lindell and Manoj
Prabhakaran",
title = "Concurrent Composition of Secure Protocols in the
Timing Model",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "4",
pages = "431--492",
month = oct,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0567-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:44 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=4&spage=431",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goh:2007:ESS,
author = "Eu-Jin Goh and Stanislaw Jarecki and Jonathan Katz and
Nan Wang",
title = "Efficient Signature Schemes with Tight Reductions to
the {Diffie--Hellman} Problems",
journal = j-J-CRYPTOLOGY,
volume = "20",
number = "4",
pages = "493--514",
month = oct,
year = "2007",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-0549-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:44 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=4&spage=493",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Haastad:2008:PCA,
author = "Johan H{\aa}stad and Mats N{\"a}slund",
title = "Practical Construction and Analysis of
Pseudo-Randomness Primitives",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "1",
pages = "1--26",
month = jan,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9009-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:47 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=1",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Exact security; Hard core function; One-way function;
Pseudo random generator",
}
@Article{Coppersmith:2008:CII,
author = "D. Coppersmith and J. S. Coron and F. Grieu and S.
Halevi and C. Jutla and D. Naccache and J. P. Stern",
title = "Cryptanalysis of {ISO/IEC 9796-1}",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "1",
pages = "27--51",
month = jan,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9007-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:47 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=27",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Cryptanalysis; Encoding scheme; ISO/IEC 9796-1
signature standard; Rabin signatures; RSA signatures",
}
@Article{Nguyen:2008:SSK,
author = "Minh-Huyen Nguyen and Salil Vadhan",
title = "Simpler Session-Key Generation from Short Random
Passwords",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "1",
pages = "52--96",
month = jan,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9008-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:47 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=52",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Authentication; Cryptographic protocols;
Human-memorizable passwords; Key exchange; Secure
two-party computation",
}
@Article{Abe:2008:TKN,
author = "Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa",
title = "{Tag-KEM\slash DEM}: a New Framework for Hybrid
Encryption",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "1",
pages = "97--130",
month = jan,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9010-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:47 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=97",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Hybrid encryption; Key encapsulation; Tag-KEM;
Threshold encryption",
}
@Article{Selcuk:2008:PSL,
author = "Ali Ayd{\i}n Sel{\c{c}}uk",
title = "On Probability of Success in Linear and Differential
Cryptanalysis",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "1",
pages = "131--147",
month = jan,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9013-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:47 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=131",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Block ciphers; Differential cryptanalysis; Linear
cryptanalysis; Order statistics; Success probability",
}
@Article{Boneh:2008:SSR,
author = "Dan Boneh and Xavier Boyen",
title = "Short Signatures Without Random Oracles and the {SDH}
Assumption in Bilinear Groups",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "2",
pages = "149--177",
month = apr,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9005-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:52 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=149",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Bilinear pairings; Digital signatures; Standard model;
Strong unforgeability",
}
@Article{Bentahar:2008:GCI,
author = "K. Bentahar and P. Farshim and J. Malone-Lee and N. P.
Smart",
title = "Generic Constructions of Identity-Based and
Certificateless {KEMs}",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "2",
pages = "178--199",
month = apr,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9000-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:52 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=178",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2008:LBI,
author = "Yehuda Lindell",
title = "Lower Bounds and Impossibility Results for Concurrent
Self Composition",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "2",
pages = "200--249",
month = apr,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9015-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:52 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=200",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Impossibility results; Lower bounds; Non-black-box and
black-box simulation; Protocol composition; Secure
computation; Self and general composition",
}
@Article{Renault:2008:PRP,
author = "J{\'e}r{\^o}me Renault and Tristan Tomala",
title = "Probabilistic Reliability and Privacy of Communication
Using Multicast in General Neighbor Networks",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "2",
pages = "250--279",
month = apr,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9018-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:52 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=250",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Communication networks; Graphs; Incomplete
information; Multicast; Repeated games; Security",
}
@Article{Overbeck:2008:SAP,
author = "R. Overbeck",
title = "Structural Attacks for Public Key Cryptosystems based
on {Gabidulin} Codes",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "2",
pages = "280--301",
month = apr,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9003-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:52 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=280",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Code based cryptography; Gabidulin codes; Public key
cryptography; Rank distance codes",
}
@Article{Katz:2008:HEP,
author = "Jonathan Katz and Yehuda Lindell",
title = "Handling Expected Polynomial-Time Strategies in
Simulation-Based Security Proofs",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "3",
pages = "303--349",
month = jul,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9004-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:57 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=303",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Black-box simulation; Expected polynomial-time; Secure
multiparty computation; Zero-knowledge",
}
@Article{Abdalla:2008:SER,
author = "Michel Abdalla and Mihir Bellare and Dario Catalano
and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and
John Malone-Lee and Gregory Neven and Pascal Paillier
and Haixia Shi",
title = "Searchable Encryption Revisited: Consistency
Properties, Relation to Anonymous {IBE}, and
Extensions",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "3",
pages = "350--391",
month = jul,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9006-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:57 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=350",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Anonymity; Foundations; Identity-based encryption;
Random-oracle model; Searchable encryption",
}
@Article{Barkan:2008:ICO,
author = "Elad Barkan and Eli Biham and Nathan Keller",
title = "Instant Ciphertext-Only Cryptanalysis of {GSM}
Encrypted Communication",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "3",
pages = "392--429",
month = jul,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9001-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:57 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=392",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "A5/1; A5/2; Cellular; Ciphertext-only; Cryptanalysis;
GPRS; GSM; SIM; SMS",
}
@Article{Lu:2008:CEL,
author = "Yi Lu and Serge Vaudenay",
title = "Cryptanalysis of an {E0}-like Combiner with Memory",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "3",
pages = "430--457",
month = jul,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9017-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:57 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=430",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Bluetooth; Combiner; Correlation; E0; Stream cipher",
}
@Article{Matucci:2008:CSP,
author = "Francesco Matucci",
title = "Cryptanalysis of the {Shpilrain--Ushakov} Protocol for
{Thompson}'s Group",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "3",
pages = "458--468",
month = jul,
year = "2008",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-007-9016-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Jul 9 16:34:57 MDT 2008",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=458",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Conjugacy problem; Decomposition problem; Infinite
groups; Normal form; Piecewise-linear homeomorphism",
}
@Article{Bellare:2008:AER,
author = "Mihir Bellare and Chanathip Namprempre",
title = "Authenticated Encryption: Relations among Notions and
Analysis of the Generic Composition Paradigm",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "4",
pages = "469--491",
month = oct,
year = "2008",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:58 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=469",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{KAsters:2008:RBN,
author = "Ralf K{\"u}sters and Anupam Datta and John C. Mitchell
and Ajith Ramanathan",
title = "On the Relationships between Notions of
Simulation-Based Security",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "4",
pages = "492--546",
month = oct,
year = "2008",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:58 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=492",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jutla:2008:EMA,
author = "Charanjit S. Jutla",
title = "Encryption Modes with Almost Free Message Integrity",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "4",
pages = "547--578",
month = oct,
year = "2008",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:58 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=547",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jain:2008:NBC,
author = "Rahul Jain",
title = "New Binding-Concealing Trade-Offs for Quantum String
Commitment",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "4",
pages = "579--592",
month = oct,
year = "2008",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:58 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=579",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Diem:2008:ICC,
author = "Claus Diem and Emmanuel Thom{\'e}",
title = "Index Calculus in Class Groups of Non-hyperelliptic
Curves of Genus Three",
journal = j-J-CRYPTOLOGY,
volume = "21",
number = "4",
pages = "593--611",
month = oct,
year = "2008",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:58 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=593",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bellare:2009:SPI,
author = "Mihir Bellare and Chanathip Namprempre and Gregory
Neven",
title = "Security Proofs for Identity-Based Identification and
Signature Schemes",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "1",
pages = "1--61",
month = jan,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:59 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=1",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lempken:2009:PKC,
author = "Wolfgang Lempken and Trung van Tran and Spyros S.
Magliveras and Wandi Wei",
title = "A Public Key Cryptosystem Based on Non-abelian Finite
Groups",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "1",
pages = "62--74",
month = jan,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:59 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=62",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Impagliazzo:2009:CTD,
author = "Russell Impagliazzo and Ragesh Jaiswal and Valentine
Kabanets",
title = "{Chernoff}-Type Direct Product Theorems",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "1",
pages = "75--92",
month = jan,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:59 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=75",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Charles:2009:CHF,
author = "Denis X. Charles and Kristin E. Lauter and Eyal Z.
Goren",
title = "Cryptographic Hash Functions from Expander Graphs",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "1",
pages = "93--113",
month = jan,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:59 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=93",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
remark = "The LPS hash function in this article has now been
completely broken; see \cite{Petit:2008:EPR} in
hash.bib.",
}
@Article{Bender:2009:RSS,
author = "Adam Bender and Jonathan Katz and Ruggero Morselli",
title = "Ring Signatures: Stronger Definitions, and
Constructions without Random Oracles",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "1",
pages = "114--138",
month = jan,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:38:59 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=114",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Nguyen:2009:LPC,
author = "Phong Q. Nguyen and Oded Regev",
title = "Learning a Parallelepiped: Cryptanalysis of {GGH} and
{NTRU} Signatures",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "2",
pages = "139--160",
month = apr,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:01 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=139",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2009:PSY,
author = "Yehuda Lindell and Benny Pinkas",
title = "A Proof of Security of {Yao}'s Protocol for Two-Party
Computation",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "2",
pages = "161--188",
month = apr,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:01 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=161",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Moran:2009:NIT,
author = "Tal Moran and Ronen Shaltiel and Amnon Ta-Shma",
title = "Non-interactive Timestamping in the Bounded-Storage
Model",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "2",
pages = "189--226",
month = apr,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:01 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=189",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Tassa:2009:MSS,
author = "Tamir Tassa and Nira Dyn",
title = "Multipartite Secret Sharing by Bivariate
Interpolation",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "2",
pages = "227--258",
month = apr,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:01 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=227",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Barbosa:2009:CDU,
author = "M. Barbosa and A. Moss and D. Page",
title = "Constructive and Destructive Use of Compilers in
Elliptic Curve Cryptography",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "2",
pages = "259--281",
month = apr,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:01 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=259",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Haitner:2009:RCA,
author = "Iftach Haitner and Omer Horvitz and Jonathan Katz and
Chiu-Yuen Koo and Ruggero Morselli and others",
title = "Reducing Complexity Assumptions for
Statistically-Hiding Commitment",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "3",
pages = "283--310",
month = jul,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:02 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=283",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Black:2009:IHE,
author = "J. Black and M. Cochran and T. Shrimpton",
title = "On the Impossibility of Highly-Efficient
Blockcipher-Based Hash Functions",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "3",
pages = "311--329",
month = jul,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:02 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=311",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Rubin:2009:UAV,
author = "K. Rubin and A. Silverberg",
title = "Using {Abelian} Varieties to Improve Pairing-Based
Cryptography",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "3",
pages = "330--364",
month = jul,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:02 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=330",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dedic:2009:ULB,
author = "Nenad Dedi{\'c} and Gene Itkis and Leonid Reyzin and
Scott Russell",
title = "Upper and Lower Bounds on Black-Box Steganography",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "3",
pages = "365--394",
month = jul,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:02 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=365",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2009:GCU,
author = "Yehuda Lindell",
title = "General Composition and Universal Composability in
Secure Multiparty Computation",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "3",
pages = "395--428",
month = jul,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:02 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=395",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Applebaum:2009:CCI,
author = "Benny Applebaum and Yuval Ishai and Eyal Kushilevitz",
title = "Cryptography with Constant Input Locality",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "4",
pages = "429--469",
month = oct,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:03 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=429",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cash:2009:TDP,
author = "David Cash and Eike Kiltz and Victor Shoup",
title = "The Twin {Diffie--Hellman} Problem and Applications",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "4",
pages = "470--504",
month = oct,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:03 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=470",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Smith:2009:IDL,
author = "Benjamin Smith",
title = "Isogenies and the Discrete Logarithm Problem in
{Jacobians} of Genus $3$ Hyperelliptic Curves",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "4",
pages = "505--529",
month = oct,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:03 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=505",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fischlin:2009:ENM,
author = "Marc Fischlin and Roger Fischlin",
title = "Efficient Non-malleable Commitment Schemes",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "4",
pages = "530--571",
month = oct,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:03 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=530",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{DiRaimondo:2009:NAD,
author = "Mario {Di Raimondo} and Rosario Gennaro",
title = "New Approaches for Deniable Authentication",
journal = j-J-CRYPTOLOGY,
volume = "22",
number = "4",
pages = "572--615",
month = oct,
year = "2009",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:03 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=572",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goldreich:2010:EPP,
author = "Oded Goldreich",
title = "On Expected Probabilistic Polynomial-Time Adversaries:
a Suggestion for Restricted Definitions and Their
Benefits",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "1",
pages = "1--36",
month = jan,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:05 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=1",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Tromer:2010:ECA,
author = "Eran Tromer and Dag Arne Osvik and Adi Shamir",
title = "Efficient Cache Attacks on {AES}, and
Countermeasures",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "1",
pages = "37--71",
month = jan,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:05 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=37",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Knudsen:2010:CM,
author = "Lars R. Knudsen and John Erik Mathiassen and
Fr{\'e}d{\'e}ric Muller and S{\o}ren S. Thomsen",
title = "Cryptanalysis of {MD2}",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "1",
pages = "72--90",
month = jan,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:05 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=72",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Desmedt:2010:NIP,
author = "Yvo Desmedt and Rosario Gennaro and Kaoru Kurosawa and
Victor Shoup",
title = "A New and Improved Paradigm for Hybrid Encryption
Secure Against Chosen-Ciphertext Attack",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "1",
pages = "91--120",
month = jan,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:05 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=91",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hofheinz:2010:OCP,
author = "Dennis Hofheinz and John Malone-Lee and Martijn Stam",
title = "Obfuscation for Cryptographic Purposes",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "1",
pages = "121--168",
month = jan,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:05 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=121",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Micciancio:2010:RGP,
author = "Daniele Micciancio",
title = "The {RSA} Group is Pseudo-Free",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "2",
pages = "169--186",
month = apr,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:06 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=169",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Morrissey:2010:THP,
author = "P. Morrissey and N. P. Smart and B. Warinschi",
title = "The {TLS} Handshake Protocol: a Modular Analysis",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "2",
pages = "187--223",
month = apr,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:06 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=187",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Freeman:2010:TPF,
author = "David Freeman and Michael Scott and Edlyn Teske",
title = "A Taxonomy of Pairing-Friendly Elliptic Curves",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "2",
pages = "224--280",
month = apr,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:06 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=224",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Aumann:2010:SAC,
author = "Yonatan Aumann and Yehuda Lindell",
title = "Security Against Covert Adversaries: Efficient
Protocols for Realistic Adversaries",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "2",
pages = "281--343",
month = apr,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:06 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=281",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beimel:2010:HSW,
author = "Amos Beimel and Tal Malkin and Kobbi Nissim and Enav
Weinreb",
title = "How Should We Solve Search Problems Privately?",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "2",
pages = "344--371",
month = apr,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:06 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=344",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Aggarwal:2010:SCM,
author = "Gagan Aggarwal and Nina Mishra and Benny Pinkas",
title = "Secure Computation of the Median (and Other Elements
of Specified Ranks)",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "3",
pages = "373--401",
month = jul,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:07 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=373",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Katz:2010:PCS,
author = "Jonathan Katz and Ji Sun Shin and Adam Smith",
title = "Parallel and Concurrent Security of the {HB} and
{HB$^+$} Protocols",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "3",
pages = "402--421",
month = jul,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:07 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=402",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2010:EPS,
author = "Carmit Hazay and Yehuda Lindell",
title = "Efficient Protocols for Set Intersection and Pattern
Matching with Security Against Malicious and Covert
Adversaries",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "3",
pages = "422--456",
month = jul,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:07 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=422",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cheon:2010:DLP,
author = "Jung Hee Cheon",
title = "Discrete Logarithm Problems with Auxiliary Inputs",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "3",
pages = "457--476",
month = jul,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:07 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=457",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Konstantinou:2010:EGP,
author = "Elisavet Konstantinou and Aristides Kontogeorgis and
Yannis C. Stamatiou and Christos Zaroliagis",
title = "On the Efficient Generation of Prime-Order Elliptic
Curves",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "3",
pages = "477--503",
month = jul,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Aug 25 09:39:07 MDT 2010",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=477",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biryukov:2010:SCS,
author = "Alex Biryukov and Adi Shamir",
title = "Structural Cryptanalysis of {SASAS}",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "4",
pages = "505--518",
month = oct,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:42 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=505",
abstract = "In this paper we consider the security of block
ciphers which contain alternate layers of invertible
S-boxes and affine mappings (there are many popular
cryptosystems which use this structure, including the
winner of the AES competition, Rijndael). We show that
a five-layer scheme with 128-bit plaintexts and 8-bit
S-boxes is surprisingly weak against what we call a
multiset attack, even when all the S-boxes and affine
mappings are key dependent (and thus completely unknown
to the attacker). We tested the multiset attack with an
actual implementation, which required just $2^{16}$
chosen plaintexts and a few seconds on a single PC to
find the $2^{17}$ bits of information in all the
unknown elements of the scheme.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Black:2010:ABB,
author = "J. Black and P. Rogaway and T. Shrimpton and M. Stam",
title = "An Analysis of the Blockcipher--Based Hash Functions
from {PGV}",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "4",
pages = "519--545",
month = oct,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:42 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=519",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Groth:2010:VSS,
author = "Jens Groth",
title = "A Verifiable Secret Shuffle of Homomorphic
Encryptions",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "4",
pages = "546--579",
month = oct,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:42 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=546",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Barkol:2010:MSS,
author = "Omer Barkol and Yuval Ishai and Enav Weinreb",
title = "On $d$-Multiplicative Secret Sharing",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "4",
pages = "580--593",
month = oct,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:42 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=580",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Muller-Quade:2010:LTS,
author = "J{\"o}rn M{\"u}ller-Quade and Dominique Unruh",
title = "Long-Term Security and Universal Composability",
journal = j-J-CRYPTOLOGY,
volume = "23",
number = "4",
pages = "594--671",
month = oct,
year = "2010",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:42 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=594",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Indesteege:2011:PCE,
author = "Sebastiaan Indesteege and Bart Preneel",
title = "Practical Collisions for {EnRUPT}",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "1",
pages = "1--23",
month = jan,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:43 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=1",
abstract = "The EnRUPT hash functions were proposed by O Neil,
Nohl and Henzen as candidates for the SHA-3
competition, organised by NIST. The proposal contains
seven concrete hash functions, each with a different
digest length. We present a practical collision attack
on each of these seven EnRUPT variants. The time
complexity of our attack varies from $2^{36}$ to
$2^{40}$ round computations, depending on the EnRUPT
variant, and the memory requirements are negligible. We
demonstrate that our attack is practical by giving an
actual collision example for EnRUPT-256.",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
keywords = "Collision attack; EnRUPT; Hash function; SHA-3
candidate",
}
@Article{Enge:2011:DLA,
author = "Andreas Enge and Pierrick Gaudry and Emmanuel
Thom{\'e}",
title = "An {$L(1/3)$} Discrete Logarithm Algorithm for Low
Degree Curves",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "1",
pages = "24--41",
month = jan,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:43 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=24",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abdalla:2011:WIB,
author = "Michel Abdalla and James Birkett and Dario Catalano
and Alexander W. Dent and John Malone-Lee and Gregory
Neven and Jacob C. N. Schuldt and Nigel P. Smart",
title = "Wildcarded Identity-Based Encryption",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "1",
pages = "42--82",
month = jan,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:43 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=42",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canetti:2011:UCS,
author = "Ran Canetti and Jonathan Herzog",
title = "Universally Composable Symbolic Security Analysis",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "1",
pages = "83--147",
month = jan,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:43 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=83",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Grassl:2011:CTZ,
author = "Markus Grassl and Ivana Ili{\'c} and Spyros Magliveras
and Rainer Steinwandt",
title = "Cryptanalysis of the {Tillich--Z{\'e}mor} Hash
Function",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "1",
pages = "148--156",
month = jan,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:43 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=148",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Asharov:2011:UDC,
author = "Gilad Asharov and Yehuda Lindell",
title = "Utility Dependence in Correct and Fair Rational Secret
Sharing",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "1",
pages = "157--202",
month = jan,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:43 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=157",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fischlin:2011:ENM,
author = "Marc Fischlin and Roger Fischlin",
title = "Efficient Non-Malleable Commitment Schemes",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "1",
pages = "203--244",
month = jan,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 10 17:59:43 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=203",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Paar:2011:GE,
author = "Christof Paar and Jean-Jacques Quisquater and Berk
Sunar",
title = "Guest Editorial",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "2",
pages = "245--246",
month = apr,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:08 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=245",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canivet:2011:GLF,
author = "G. Canivet and P. Maistri and R. Leveugle and J.
Cl{\'e}di{\`e}re and F. Valette and M. Renaudin",
title = "Glitch and Laser Fault Attacks onto a Secure {AES}
Implementation on a {SRAM}-Based {FPGA}",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "2",
pages = "247--268",
month = apr,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:08 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=247",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Batina:2011:MIA,
author = "Lejla Batina and Benedikt Gierlichs and Emmanuel
Prouff and Matthieu Rivain and Fran{\c{c}}ois-Xavier
Standaert and Nicolas Veyrat-Charvillon",
title = "Mutual Information Analysis: a Comprehensive Study",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "2",
pages = "269--291",
month = apr,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:08 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=269",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Nikova:2011:SHI,
author = "Svetla Nikova and Vincent Rijmen and Martin
Schl{\"a}ffer",
title = "Secure Hardware Implementation of Nonlinear Functions
in the Presence of Glitches",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "2",
pages = "292--321",
month = apr,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:08 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=292",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Poschmann:2011:SCR,
author = "Axel Poschmann and Amir Moradi and Khoongming Khoo and
Chu-Wee Lim and Huaxiong Wang and San Ling",
title = "Side-Channel Resistant Crypto for Less than 2,300
{GE}",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "2",
pages = "322--345",
month = apr,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:08 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=322",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dominguez-Oviedo:2011:FBA,
author = "Agustin Dominguez-Oviedo and M. Anwar Hasan and Bijan
Ansari",
title = "Fault-Based Attack on {Montgomery}'s Ladder
Algorithm",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "2",
pages = "346--374",
month = apr,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:08 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=346",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Maiti:2011:IRO,
author = "Abhranil Maiti and Patrick Schaumont",
title = "Improved Ring Oscillator {PUF}: An {FPGA}-friendly
Secure Primitive",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "2",
pages = "375--397",
month = apr,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:08 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=375",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Baudet:2011:SOB,
author = "Mathieu Baudet and David Lubicz and Julien Micolod and
Andr{\'e} Tassiaux",
title = "On the Security of Oscillator-Based Random Number
Generators",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "2",
pages = "398--425",
month = apr,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:08 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=398",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hell:2011:BSC,
author = "Martin Hell and Thomas Johansson",
title = "Breaking the Stream Ciphers {F-FCSR-H} and {F-FCSR-16}
in Real Time",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "3",
pages = "427--445",
month = jul,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:15 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=427",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Galbraith:2011:EFE,
author = "Steven D. Galbraith and Xibin Lin and Michael Scott",
title = "Endomorphisms for Faster Elliptic Curve Cryptography
on a Large Class of Curves",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "3",
pages = "446--469",
month = jul,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:15 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=446",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hofheinz:2011:PIR,
author = "Dennis Hofheinz",
title = "Possibility and Impossibility Results for Selective
Decommitments",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "3",
pages = "470--516",
month = jul,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:15 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=470",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kidron:2011:IRU,
author = "Dafna Kidron and Yehuda Lindell",
title = "Impossibility Results for Universal Composability in
Public-Key Models and with Fixed Inputs",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "3",
pages = "517--544",
month = jul,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:15 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=517",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Monnerat:2011:SUS,
author = "Jean Monnerat and Serge Vaudenay",
title = "Short Undeniable Signatures Based on Group
Homomorphisms",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "3",
pages = "545--587",
month = jul,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:15 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=545",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Liskov:2011:TBC,
author = "Moses Liskov and Ronald L. Rivest and David Wagner",
title = "Tweakable Block Ciphers",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "3",
pages = "588--613",
month = jul,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 5 18:01:15 MDT 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=588",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Garay:2011:RFC,
author = "Juan A. Garay and Philip MacKenzie and Manoj
Prabhakaran and Ke Yang",
title = "Resource Fairness and Composability of Cryptographic
Protocols",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "4",
pages = "615--658",
month = oct,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Dec 10 15:17:11 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=615",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Boneh:2011:ESI,
author = "Dan Boneh and Xavier Boyen",
title = "Efficient Selective Identity-Based Encryption Without
Random Oracles",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "4",
pages = "659--693",
month = oct,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Dec 10 15:17:11 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=659",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hohenberger:2011:SOR,
author = "Susan Hohenberger and Guy N. Rothblum and Abhi Shelat
and Vinod Vaikuntanathan",
title = "Securely Obfuscating Re-Encryption",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "4",
pages = "694--719",
month = oct,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Dec 10 15:17:11 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=694",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Barak:2011:SCA,
author = "Boaz Barak and Ran Canetti and Yehuda Lindell and
Rafael Pass and Tal Rabin",
title = "Secure Computation Without Authentication",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "4",
pages = "720--760",
month = oct,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Dec 10 15:17:11 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=720",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2011:AZK,
author = "Yehuda Lindell and Hila Zarosim",
title = "Adaptive Zero-Knowledge Proofs and Adaptively Secure
Oblivious Transfer",
journal = j-J-CRYPTOLOGY,
volume = "24",
number = "4",
pages = "761--799",
month = oct,
year = "2011",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Dec 10 15:17:11 MST 2011",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=761",
acknowledgement = ack-nhfb,
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jain:2012:RRP,
author = "Rahul Jain",
title = "Resource Requirements of Private Quantum Channels and
Consequences for Oblivious Remote State Preparation",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "1",
pages = "1--13",
month = jan,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:14:18 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gordon:2012:PFS,
author = "S. Dov Gordon and Jonathan Katz",
title = "Partial Fairness in Secure Two-Party Computation",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "1",
pages = "14--40",
month = jan,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:14:18 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=14",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Katz:2012:WLR,
author = "Jonathan Katz",
title = "Which Languages Have 4-Round Zero-Knowledge Proofs?",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "1",
pages = "41--56",
month = jan,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:14:18 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=41",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Boldyreva:2012:SPS,
author = "Alexandra Boldyreva and Adriana Palacio and Bogdan
Warinschi",
title = "Secure Proxy Signature Schemes for Delegation
of Signing Rights",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "1",
pages = "57--115",
month = jan,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:14:18 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=57",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Pietrzak:2012:PRC,
author = "Krzysztof Pietrzak and Douglas Wikstr{\"o}m",
title = "Parallel Repetition of Computationally Sound Protocols
Revisited",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "1",
pages = "116--135",
month = jan,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:14:18 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=116",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Aerts:2012:PAK,
author = "Wim Aerts and Eli Biham and Dieter {De Moiti{\'e}} and
Elke {De Mulder} and Orr Dunkelman and Sebastiaan
Indesteege and Nathan Keller and Bart Preneel and Guy
A. E. Vandenbosch and Ingrid Verbauwhede",
title = "A Practical Attack on {KeeLoq}",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "1",
pages = "136--157",
month = jan,
year = "2012",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-010-9091-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:14:18 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=136",
abstract = "KeeLoq is a lightweight block cipher with a 32-bit
block size and a 64-bit key. Despite its short key
size, it is used in remote keyless entry systems and
other wireless authentication applications. For
example, there are indications that authentication
protocols based on KeeLoq are used, or were used by
various car manufacturers in anti-theft mechanisms.
This paper presents a practical key recovery attack
against KeeLoq that requires $2^{16}$ known plaintexts
and has a time complexity of $2^{44.5}$ KeeLoq
encryptions. It is based on the principle of slide
attacks and a novel approach to meet-in-the-middle
attacks.\par
We investigated the way KeeLoq is intended to be used
in practice and conclude that our attack can be used to
subvert the security of real systems. In some scenarios
the adversary may even reveal the master secret used in
an entire class of devices from attacking a single
device. Our attack has been fully implemented. We have
built a device that can obtain the data required for
the attack in less than 100 minutes, and our software
experiments show that, given the data, the key can be
found in 7.8 days of calculations on 64 CPU cores.",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Halevi:2012:SPH,
author = "Shai Halevi and Yael Tauman Kalai",
title = "Smooth Projective Hashing and Two-Message Oblivious
Transfer",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "1",
pages = "158--193",
month = jan,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:14:18 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=158",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cheon:2012:APR,
author = "Jung Hee Cheon and Jin Hong and Minkyu Kim",
title = "Accelerating {Pollard}'s Rho Algorithm on Finite
Fields",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "2",
pages = "195--242",
month = apr,
year = "2012",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-010-9093-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:11:13 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=195",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ateniese:2012:PST,
author = "Giuseppe Ateniese and Alfredo {De Santis} and Anna
Lisa Ferrara and Barbara Masucci",
title = "Provably-Secure Time-Bound Hierarchical Key Assignment
Schemes",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "2",
pages = "243--270",
month = apr,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:11:13 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=243",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hirose:2012:SVM,
author = "Shoichi Hirose and Je Hong Park and Aaram Yun",
title = "A Simple Variant of the {Merkle--Damg{\aa}rd} Scheme
with a Permutation",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "2",
pages = "271--309",
month = apr,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:11:13 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=271",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Roeder:2012:MVS,
author = "Tom Roeder and Rafael Pass and Fred B. Schneider",
title = "Multi-Verifier Signatures",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "2",
pages = "310--348",
month = apr,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:11:13 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=310",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Minder:2012:ETA,
author = "Lorenz Minder and Alistair Sinclair",
title = "The Extended $k$-tree Algorithm",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "2",
pages = "349--382",
month = apr,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Jan 17 10:11:13 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=349",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2012:ESO,
author = "Carmit Hazay and Kobbi Nissim",
title = "Efficient Set Operations in the Presence of Malicious
Adversaries",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "3",
pages = "383--433",
month = jul,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Apr 6 18:10:11 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=383",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Farras:2012:IMS,
author = "Oriol Farr{\`a}s and Jaume Mart{\'\i}-Farr{\'e} and
Carles Padr{\'o}",
title = "Ideal Multipartite Secret Sharing Schemes",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "3",
pages = "434--463",
month = jul,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Apr 6 18:10:11 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=434",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Smyshlyaev:2012:PBB,
author = "Stanislav V. Smyshlyaev",
title = "Perfectly Balanced {Boolean} Functions and {Goli{\'c}
Conjecture}",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "3",
pages = "464--483",
month = jul,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Apr 6 18:10:11 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=464",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hofheinz:2012:PHF,
author = "Dennis Hofheinz and Eike Kiltz",
title = "Programmable Hash Functions and Their Applications",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "3",
pages = "484--527",
month = jul,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Apr 6 18:10:11 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=484",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kawachi:2012:CIB,
author = "Akinori Kawachi and Takeshi Koshiba and Harumichi
Nishimura and Tomoyuki Yamakami",
title = "Computational Indistinguishability Between Quantum
States and Its Cryptographic Application",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "3",
pages = "528--555",
month = jul,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Apr 6 18:10:11 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=528",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Desmedt:2012:GCA,
author = "Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and
Xiaoming Sun and Christophe Tartary and Huaxiong Wang
and Andrew Chi-Chih Yao",
title = "Graph Coloring Applied to Secure Computation in
Non-{Abelian} Groups",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "4",
pages = "557--600",
month = oct,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Oct 26 07:18:53 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=557",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cash:2012:BTH,
author = "David Cash and Dennis Hofheinz and Eike Kiltz and
Chris Peikert",
title = "Bonsai Trees, or How to Delegate a Lattice Basis",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "4",
pages = "601--639",
month = oct,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Oct 26 07:18:53 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=601",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bellare:2012:LCH,
author = "M. Bellare and A. Boldyreva and L. Knudsen and C.
Namprempre",
title = "On-line Ciphers and the Hash-{CBC} Constructions",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "4",
pages = "640--679",
month = oct,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Oct 26 07:18:53 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=640",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2012:STP,
author = "Yehuda Lindell and Benny Pinkas",
title = "Secure {Two--Party} Computation via Cut-and-Choose
Oblivious Transfer",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "4",
pages = "680--722",
month = oct,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Oct 26 07:18:53 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=680",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Camenisch:2012:BVS,
author = "Jan Camenisch and Susan Hohenberger and Michael
{\O}stergaard Pedersen",
title = "Batch Verification of Short Signatures",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "4",
pages = "723--747",
month = oct,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Oct 26 07:18:53 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=723",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gauravaram:2012:SAR,
author = "Praveen Gauravaram and Lars R. Knudsen",
title = "Security Analysis of {Randomize-Hash-then-Sign}
Digital Signatures",
journal = j-J-CRYPTOLOGY,
volume = "25",
number = "4",
pages = "748--779",
month = oct,
year = "2012",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Oct 26 07:18:53 MDT 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=748",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Pass:2013:PCP,
author = "Rafael Pass and Alon Rosen and Wei-Lung Dustin Tseng",
title = "Public-Coin Parallel Zero--Knowledge for {NP}",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "1",
pages = "1--10",
month = jan,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-011-9110-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:26 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-011-9110-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Borghoff:2013:SSD,
author = "Julia Borghoff and Lars R. Knudsen and Gregor Leander
and S{\o}ren S. Thomsen",
title = "Slender-Set Differential Cryptanalysis",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "1",
pages = "11--38",
month = jan,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-011-9111-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:26 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-011-9111-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Freeman:2013:MCL,
author = "David Mandell Freeman and Oded Goldreich and Eike
Kiltz and Alon Rosen and Gil Segev",
title = "More Constructions of Lossy and Correlation-Secure
Trapdoor Functions",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "1",
pages = "39--74",
month = jan,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-011-9112-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:26 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-011-9112-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ghodosi:2013:AUS,
author = "Hossein Ghodosi",
title = "Analysis of an Unconditionally Secure Distributed
Oblivious Transfer",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "1",
pages = "75--79",
month = jan,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-011-9113-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:26 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-011-9113-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fujisaki:2013:SIA,
author = "Eiichiro Fujisaki and Tatsuaki Okamoto",
title = "Secure Integration of Asymmetric and Symmetric
Encryption Schemes",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "1",
pages = "80--101",
month = jan,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-011-9114-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:26 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-011-9114-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hofheinz:2013:PCC,
author = "Dennis Hofheinz and Eike Kiltz and Victor Shoup",
title = "Practical Chosen Ciphertext Secure Encryption from
Factoring",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "1",
pages = "102--118",
month = jan,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-011-9115-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:26 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-011-9115-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Joux:2013:ECD,
author = "Antoine Joux and Vanessa Vitse",
title = "Elliptic Curve Discrete Logarithm Problem over Small
Degree Extension Fields",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "1",
pages = "119--143",
month = jan,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-011-9116-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:26 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-011-9116-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bogdanov:2013:ILH,
author = "Andrej Bogdanov and Alon Rosen",
title = "Input Locality and Hardness Amplification",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "1",
pages = "144--171",
month = jan,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-011-9117-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:26 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-011-9117-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Isobe:2013:SKA,
author = "Takanori Isobe",
title = "A Single-Key Attack on the Full {GOST} Block Cipher",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "1",
pages = "172--189",
month = jan,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9118-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:26 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9118-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Katz:2013:PES,
author = "Jonathan Katz and Amit Sahai and Brent Waters",
title = "Predicate Encryption Supporting Disjunctions,
Polynomial Equations, and Inner Products",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "2",
pages = "191--224",
month = apr,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9119-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:27 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9119-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jager:2013:ACA,
author = "Tibor Jager and J{\"o}rg Schwenk",
title = "On the Analysis of Cryptographic Assumptions in the
Generic Ring Model",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "2",
pages = "225--245",
month = apr,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9120-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:27 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9120-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Coron:2013:NBC,
author = "Jean-S{\'e}bastien Coron and Alexey Kirichenko and
Mehdi Tibouchi",
title = "A Note on the {Bivariate Coppersmith Theorem}",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "2",
pages = "246--250",
month = apr,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9121-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:27 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9121-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Chase:2013:MCA,
author = "Melissa Chase and Alexander Healy and Anna Lysyanskaya
and Tal Malkin and Leonid Reyzin",
title = "Mercurial Commitments with Applications to
Zero-Knowledge Sets",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "2",
pages = "251--279",
month = apr,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9122-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:27 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9122-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Boyar:2013:LMT,
author = "Joan Boyar and Philip Matthews and Ren{\'e} Peralta",
title = "Logic Minimization Techniques with Applications to
Cryptology",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "2",
pages = "280--312",
month = apr,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9124-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:27 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9124-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Aumasson:2013:QLH,
author = "Jean-Philippe Aumasson and Luca Henzen and Willi Meier
and Mar{\'\i}a Naya-Plasencia",
title = "{{\sc Quark}}: a Lightweight Hash",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "2",
pages = "313--339",
month = apr,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9125-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:27 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9125-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lu:2013:SAS,
author = "Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav
Shacham and Brent Waters",
title = "Sequential Aggregate Signatures, Multisignatures, and
Verifiably Encrypted Signatures Without Random
Oracles",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "2",
pages = "340--373",
month = apr,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9126-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Apr 2 12:31:27 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9126-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hofheinz:2013:PRC,
author = "Dennis Hofheinz and Dominique Unruh and J{\"o}rn
M{\"u}ller-Quade",
title = "Polynomial Runtime and Composability",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "3",
pages = "375--441",
month = jul,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9127-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Jun 6 07:19:15 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9127-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Shacham:2013:CPR,
author = "Hovav Shacham and Brent Waters",
title = "Compact Proofs of Retrievability",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "3",
pages = "442--483",
month = jul,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9129-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Jun 6 07:19:15 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9129-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goldreich:2013:ETP,
author = "Oded Goldreich and Ron D. Rothblum",
title = "Enhancements of Trapdoor Permutations",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "3",
pages = "484--512",
month = jul,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9131-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Jun 6 07:19:15 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9131-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Boyle:2013:FLR,
author = "Elette Boyle and Gil Segev and Daniel Wichs",
title = "Fully Leakage-Resilient Signatures",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "3",
pages = "513--558",
month = jul,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9136-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Jun 6 07:19:15 MDT 2013",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9136-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hong:2013:CCT,
author = "Jin Hong and Sunghwan Moon",
title = "A Comparison of Cryptanalytic Tradeoff Algorithms",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "4",
pages = "559--637",
month = oct,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9128-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:31 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
note = "See erratum \cite{Hong:2014:EBC}.",
URL = "http://link.springer.com/article/10.1007/s00145-012-9128-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2013:NCR,
author = "Yehuda Lindell",
title = "A Note on Constant-Round Zero-Knowledge Proofs of
Knowledge",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "4",
pages = "638--654",
month = oct,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9132-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:31 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9132-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{vanDijk:2013:FGS,
author = "Marten van Dijk and Ari Juels and Alina Oprea and
Ronald L. Rivest",
title = "{FlipIt}: The Game of ``Stealthy Takeover''",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "4",
pages = "655--713",
month = oct,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9134-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:31 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9134-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Katz:2013:ROP,
author = "Jonathan Katz and Vinod Vaikuntanathan",
title = "Round-Optimal Password-Based Authenticated Key
Exchange",
journal = j-J-CRYPTOLOGY,
volume = "26",
number = "4",
pages = "714--743",
month = oct,
year = "2013",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9133-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:31 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9133-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Stankovski:2014:ESR,
author = "Paul Stankovski and Martin Hell and Thomas Johansson",
title = "An Efficient State Recovery Attack on the {X-FCSR}
Family of Stream Ciphers",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "1",
pages = "1--22",
month = jan,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9130-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:32 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9130-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kiayias:2014:OTS,
author = "Aggelos Kiayias and Yona Raekow and Alexander
Russell",
title = "A One-Time Stegosystem and Applications to Efficient
Covert Communication",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "1",
pages = "23--44",
month = jan,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9135-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:32 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9135-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Pass:2014:CZK,
author = "Rafael Pass and Wei-Lung {Dustin Tseng}",
title = "Concurrent Zero Knowledge, Revisited",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "1",
pages = "45--66",
month = jan,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9137-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:32 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9137-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{SenGupta:2014:NRS,
author = "Sourav {Sen Gupta} and Subhamoy Maitra and Goutam Paul
and Santanu Sarkar",
title = "(Non-)Random Sequences from (Non-)Random Permutations
--- Analysis of {RC4} Stream Cipher",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "1",
pages = "67--108",
month = jan,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9138-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:32 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9138-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Haitner:2014:NIH,
author = "Iftach Haitner and Omer Reingold",
title = "A New Interactive Hashing Theorem",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "1",
pages = "109--138",
month = jan,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9139-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:32 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9139-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Birkett:2014:SMP,
author = "James Birkett and Alexander W. Dent",
title = "Security Models and Proof Strategies for
Plaintext-Aware Encryption",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "1",
pages = "139--180",
month = jan,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9141-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:32 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9141-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hong:2014:EBC,
author = "Jin Hong and Sunghwan Moon",
title = "Erratum to: {{\booktitle{A Comparison of Cryptanalytic
Tradeoff Algorithms}}}",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "1",
pages = "181--181",
month = jan,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9140-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Thu Feb 27 17:08:32 MST 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
note = "See \cite{Hong:2013:CCT}.",
URL = "http://link.springer.com/article/10.1007/s00145-012-9140-7;
http://link.springer.com/content/pdf/10.1007/s00145-012-9140-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dinur:2014:IPA,
author = "Itai Dinur and Orr Dunkelman and Adi Shamir",
title = "Improved Practical Attacks on Round-Reduced {Keccak}",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "2",
pages = "183--209",
month = apr,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9142-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 19 14:41:17 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9142-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
keywords = "collision near-collision; cryptanalysis; Keccak;
practical attack; SHA-3",
remark = "The authors exhibit hash-function collisions in
up-to-4-round Keccak-224 and Keccak-256 algorithms, but
observe that ``full Keccak has 24 rounds, [so] our
attack does not threaten the security of the [NIST
SHA-3] hash function.",
}
@Article{Brakerski:2014:BSD,
author = "Zvika Brakerski and Gil Segev",
title = "Better Security for Deterministic Public-Key
Encryption: The Auxiliary-Input Setting",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "2",
pages = "210--247",
month = apr,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9143-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 19 14:41:17 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9143-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Longa:2014:FDG,
author = "Patrick Longa and Francesco Sica",
title = "Four-Dimensional {Gallant--Lambert--Vanstone} Scalar
Multiplication",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "2",
pages = "248--283",
month = apr,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-012-9144-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 19 14:41:17 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-012-9144-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cramer:2014:ACZ,
author = "Ronald Cramer and Ivan Damg{\aa}rd and Marcel Keller",
title = "On the Amortized Complexity of Zero-Knowledge
Protocols",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "2",
pages = "284--316",
month = apr,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9145-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 19 14:41:17 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9145-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bitansky:2014:SSC,
author = "Nir Bitansky and Ran Canetti",
title = "On Strong Simulation and Composable Point
Obfuscation",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "2",
pages = "317--357",
month = apr,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9146-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 19 14:41:17 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9146-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2014:CSP,
author = "Carmit Hazay and Tomas Toft",
title = "Computationally Secure Pattern Matching in the
Presence of Malicious Adversaries",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "2",
pages = "358--395",
month = apr,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9147-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Apr 19 14:41:17 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9147-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fischlin:2014:RMP,
author = "Marc Fischlin and Anja Lehmann and Krzysztof
Pietrzak",
title = "Robust Multi-Property Combiners for Hash Functions",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "3",
pages = "397--428",
month = jul,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9148-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Aug 8 19:20:02 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9148-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Applebaum:2014:KDM,
author = "Benny Applebaum",
title = "Key-Dependent Message Security: Generic Amplification
and Completeness",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "3",
pages = "429--451",
month = jul,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9149-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Aug 8 19:20:02 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9149-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Khovratovich:2014:RRA,
author = "Dmitry Khovratovich and Ivica Nikoli{\'c} and
Christian Rechberger",
title = "Rotational Rebound Attacks on Reduced {Skein}",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "3",
pages = "452--479",
month = jul,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9150-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Aug 8 19:20:02 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9150-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Goldwasser:2014:BPO,
author = "Shafi Goldwasser and Guy N. Rothblum",
title = "On Best-Possible Obfuscation",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "3",
pages = "480--505",
month = jul,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9151-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Aug 8 19:20:02 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9151-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Groth:2014:CMS,
author = "Jens Groth and Rafail Ostrovsky",
title = "Cryptography in the Multi-string Model",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "3",
pages = "506--543",
month = jul,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9152-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Aug 8 19:20:02 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9152-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abdalla:2014:VRF,
author = "Michel Abdalla and Dario Catalano and Dario Fiore",
title = "Verifiable Random Functions: Relations to
Identity-Based Key Encapsulation and New
Constructions",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "3",
pages = "544--593",
month = jul,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9153-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Aug 8 19:20:02 MDT 2014",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9153-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Faugere:2014:USI,
author = "Jean-Charles Faug{\`e}re and Pierrick Gaudry and
Louise Huot and Gu{\'e}na{\"e}l Renault",
title = "Using Symmetries in the Index Calculus for Elliptic
Curves Discrete Logarithm",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "4",
pages = "595--635",
month = oct,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9158-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:48 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9158-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Amir:2014:AAR,
author = "Yair Amir and Paul Bunn and Rafail Ostrovsky",
title = "Authenticated Adversarial Routing",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "4",
pages = "636--771",
month = oct,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9157-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:48 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9157-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jean:2014:ICA,
author = "J{\'e}r{\'e}my Jean and Mar{\'\i}a Naya-Plasencia and
Thomas Peyrin",
title = "Improved Cryptanalysis of {{\tt AES}}-like
Permutations",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "4",
pages = "772--798",
month = oct,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9156-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:48 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=4;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9156-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
keywords = "SHA-3 hash function",
}
@Article{Bellare:2014:CCH,
author = "Mihir Bellare and Todor Ristov",
title = "A Characterization of Chameleon Hash Functions and
New, Efficient Designs",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "4",
pages = "799--823",
month = oct,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9155-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:48 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=4;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9155-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dunkelman:2014:PTR,
author = "Orr Dunkelman and Nathan Keller and Adi Shamir",
title = "A Practical-Time Related-Key Attack on the {KASUMI}
Cryptosystem Used in {GSM} and {3G} Telephony",
journal = j-J-CRYPTOLOGY,
volume = "27",
number = "4",
pages = "824--849",
month = oct,
year = "2014",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9154-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:48 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9154-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dunkelman:2015:SAE,
author = "Orr Dunkelman and Nathan Keller and Adi Shamir",
title = "Slidex Attacks on the {Even--Mansour} Encryption
Scheme",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "1",
pages = "1--28",
month = jan,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9164-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:49 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9164-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bellare:2015:SDI,
author = "Mihir Bellare and Dennis Hofheinz and Eike Kiltz",
title = "Subtleties in the Definition of {IND--CCA}: When and
How Should Challenge Decryption Be Disallowed?",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "1",
pages = "29--48",
month = jan,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9167-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:49 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9167-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Patra:2015:EAV,
author = "Arpita Patra and Ashish Choudhury and C. Pandu
Rangan",
title = "Efficient Asynchronous Verifiable Secret Sharing and
Multiparty Computation",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "1",
pages = "49--109",
month = jan,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9172-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:49 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9172-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biham:2015:CSR,
author = "Eli Biham and Rafi Chen and Antoine Joux",
title = "Cryptanalysis of {SHA-0} and Reduced {SHA-1}",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "1",
pages = "110--160",
month = jan,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9179-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:49 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=1;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9179-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
remark = "From the abstract: ``We use these techniques to find a
collision of the full SHA-0 which is the first
published collision of this function, and very
efficient collision attacks on reduced versions of
SHA-1.''",
}
@Article{Baumeler:2015:QPI,
author = "{\"A}min Baumeler and Anne Broadbent",
title = "Quantum Private Information Retrieval has Linear
Communication Complexity",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "1",
pages = "161--175",
month = jan,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9180-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:49 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9180-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bohl:2015:CGN,
author = "Florian B{\"o}hl and Dennis Hofheinz and Tibor Jager
and Jessica Koch and Christoph Striecks",
title = "Confined Guessing: New Signatures From Standard
Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "1",
pages = "176--208",
month = jan,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9183-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Tue Feb 10 08:28:49 MST 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9183-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biham:2015:NAI,
author = "Eli Biham and Orr Dunkelman and Nathan Keller and Adi
Shamir",
title = "New Attacks on {IDEA} with at Least 6 Rounds",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "2",
pages = "209--239",
month = apr,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9162-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Mar 13 09:04:53 MDT 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9162-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Sajadieh:2015:ERD,
author = "Mahdi Sajadieh and Mohammad Dakhilalian and Hamid Mala
and Pouyan Sepehrdad",
title = "Efficient Recursive Diffusion Layers for Block Ciphers
and Hash Functions",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "2",
pages = "240--256",
month = apr,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9163-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Mar 13 09:04:53 MDT 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=2;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9163-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lamberger:2015:RAS,
author = "Mario Lamberger and Florian Mendel and Martin
Schl{\"a}ffer and Christian Rechberger and Vincent
Rijmen",
title = "The Rebound Attack and Subspace Distinguishers:
Application to {Whirlpool}",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "2",
pages = "257--296",
month = apr,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9166-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Mar 13 09:04:53 MDT 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9166-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Berman:2015:NAA,
author = "Itay Berman and Iftach Haitner",
title = "From Non-adaptive to Adaptive Pseudorandom Functions",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "2",
pages = "297--311",
month = apr,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9169-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Mar 13 09:04:53 MDT 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9169-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2015:EPS,
author = "Yehuda Lindell and Benny Pinkas",
title = "An Efficient Protocol for Secure Two-Party Computation
in the Presence of Malicious Adversaries",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "2",
pages = "312--350",
month = apr,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9177-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Mar 13 09:04:53 MDT 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9177-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ahn:2015:CAD,
author = "Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan
Hohenberger and Abhi Shelat and Brent Waters",
title = "Computing on Authenticated Data",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "2",
pages = "351--395",
month = apr,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9182-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Mar 13 09:04:53 MDT 2015",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=28&issue=2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9182-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dunkelman:2015:ISK,
author = "Orr Dunkelman and Nathan Keller and Adi Shamir",
title = "Improved Single-Key Attacks on $8$-Round {AES-192} and
{AES-256}",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "397--422",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9159-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9159-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
remark = "This is an extended version of an ASIACRYPT 2010
paper, selected as one of the best papers of that
conference.",
}
@Article{Hofheinz:2015:GNU,
author = "Dennis Hofheinz and Victor Shoup",
title = "{GNUC}: A New Universal Composability Framework",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "423--508",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9160-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9160-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
keywords = "GNUC (GNUC's not UC); UC (Universal Composability)",
}
@Article{Miles:2015:CCP,
author = "Eric Miles and Emanuele Viola",
title = "On the Complexity of Constructing Pseudorandom
Functions (Especially when They Don't Exist)",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "509--532",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9161-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9161-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Malka:2015:HAP,
author = "Lior Malka",
title = "How to Achieve Perfect Simulation and a Complete
Problem for Non-interactive Perfect Zero-Knowledge",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "533--550",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9165-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9165-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beimel:2015:PMC,
author = "Amos Beimel and Eran Omri and Ilan Orlov",
title = "Protocols for Multiparty Coin Toss with a Dishonest
Majority",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "551--600",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9168-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9168-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Tsaban:2015:PTS,
author = "Boaz Tsaban",
title = "Polynomial-Time Solutions of Computational Problems in
Noncommutative-Algebraic Cryptography",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "601--622",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9170-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9170-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Berman:2015:PUA,
author = "Ron Berman and Amos Fiat and Marcin Gomulkiewicz and
Marek Klonowski",
title = "Provable Unlinkability Against Traffic Analysis with
Low Message Overhead",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "623--640",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9171-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9171-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Schage:2015:TSS,
author = "Sven Sch{\"a}ge",
title = "Tight Security for Signature Schemes Without Random
Oracles",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "641--670",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9173-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9173-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fuller:2015:UAD,
author = "Benjamin Fuller and Adam O'Neill and Leonid Reyzin",
title = "A Unified Approach to Deterministic Encryption: New
Constructions and a Connection to Computational
Entropy",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "671--717",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9174-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9174-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Soleimany:2015:RCP,
author = "Hadi Soleimany and C{\'e}line Blondeau and Xiaoli Yu
and Wenling Wu",
title = "Reflection Cryptanalysis of {PRINCE}-Like Ciphers",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "3",
pages = "718--744",
month = jul,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9175-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Aug 8 08:18:45 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9175-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Chandran:2015:AES,
author = "Nishanth Chandran and Juan A. Garay and Rafail
Ostrovsky",
title = "Almost-Everywhere Secure Computation with Edge
Corruptions",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "4",
pages = "745--768",
month = oct,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-013-9176-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 28 10:08:38 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-013-9176-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Procter:2015:WKF,
author = "Gordon Procter and Carlos Cid",
title = "On Weak Keys and Forgery Attacks Against
Polynomial-Based {MAC} Schemes",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "4",
pages = "769--795",
month = oct,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9178-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 28 10:08:38 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9178-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Aspnes:2015:SAQ,
author = "James Aspnes and Zo{\"e} Diamadi and Aleksandr
Yampolskiy and Kristian Gj{\o}steen",
title = "Spreading Alerts Quietly and the Subgroup Escape
Problem",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "4",
pages = "796--819",
month = oct,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9181-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 28 10:08:38 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9181-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gentry:2015:UFH,
author = "Craig Gentry and Jens Groth and Yuval Ishai and Chris
Peikert and Amit Sahai",
title = "Using Fully Homomorphic Hybrid Encryption to Minimize
Non-interactive Zero-Knowledge Proofs",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "4",
pages = "820--843",
month = oct,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9184-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 28 10:08:38 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9184-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bellare:2015:NPN,
author = "Mihir Bellare",
title = "New Proofs for {NMAC} and {HMAC}: Security without
Collision Resistance",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "4",
pages = "844--878",
month = oct,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9185-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 28 10:08:38 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9185-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Peyrin:2015:CAG,
author = "Thomas Peyrin",
title = "Collision Attack on {{\tt Grindahl}}",
journal = j-J-CRYPTOLOGY,
volume = "28",
number = "4",
pages = "879--898",
month = oct,
year = "2015",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9186-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 28 10:08:38 MDT 2015",
bibsource = "http://link.springer.com/journal/145/28/4;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9186-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
keywords = "AES; Collision; Cryptanalysis; Grindahl; Hash
functions",
remark = "The author reports a $ 2^{112} $ hash-computation
attack to produce collisions with the 256-bit version
of the Grindahl hash algorithm.",
}
@Article{Baldi:2016:EPK,
author = "Marco Baldi and Marco Bianchi and Franco Chiaraluce
and Joachim Rosenthal",
title = "Enhanced Public Key Security for the {McEliece}
Cryptosystem",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "1",
pages = "1--27",
month = jan,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9187-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 25 07:53:38 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9187-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bos:2016:FCG,
author = "Joppe W. Bos and Craig Costello and Huseyin Hisil and
Kristin Lauter",
title = "Fast Cryptography in Genus $2$",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "1",
pages = "28--60",
month = jan,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9188-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 25 07:53:38 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9188-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Coron:2016:HBI,
author = "Jean-S{\'e}bastien Coron and Thomas Holenstein and
Robin K{\"u}nzler",
title = "How to Build an Ideal Cipher: The Indifferentiability
of the {Feistel} Construction",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "1",
pages = "61--114",
month = jan,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9189-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 25 07:53:38 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9189-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Freedman:2016:ESI,
author = "Michael J. Freedman and Carmit Hazay and Kobbi Nissim
and Benny Pinkas",
title = "Efficient Set Intersection with Simulation-Based
Security",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "1",
pages = "115--155",
month = jan,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9190-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 25 07:53:38 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9190-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Yao:2016:CKE,
author = "Andrew Chi-Chih Yao and Moti Yung and Yunlei Zhao",
title = "Concurrent Knowledge Extraction in Public-Key Models",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "1",
pages = "156--219",
month = jan,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9191-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 25 07:53:38 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9191-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Brown:2016:BRM,
author = "Daniel R. L. Brown",
title = "Breaking {RSA} May Be As Difficult As Factoring",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "1",
pages = "220--241",
month = jan,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9192-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Jan 25 07:53:38 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9192-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gennaro:2016:AET,
author = "Rosario Gennaro and Carmit Hazay and Jeffrey S.
Sorensen",
title = "Automata Evaluation and Text Search Protocols with
Simulation-Based Security",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "2",
pages = "243--282",
month = apr,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9193-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 7 17:41:46 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9193-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Haitner:2016:LUR,
author = "Iftach Haitner and Eran Omri and Hila Zarosim",
title = "Limits on the Usefulness of Random Oracles",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "2",
pages = "283--335",
month = apr,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9194-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 7 17:41:46 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9194-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beimel:2016:SSS,
author = "Amos Beimel and Oriol Farr{\`a}s and Yuval Mintz",
title = "Secret-Sharing Schemes for Very Dense Graphs",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "2",
pages = "336--362",
month = apr,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9195-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 7 17:41:46 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9195-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abe:2016:SPS,
author = "Masayuki Abe and Georg Fuchsbauer and Jens Groth and
Kristiyan Haralambiev and Miyako Ohkubo",
title = "Structure-Preserving Signatures and Commitments to
Group Elements",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "2",
pages = "363--421",
month = apr,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-014-9196-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 7 17:41:46 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-014-9196-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Faust:2016:SSS,
author = "Sebastian Faust and Carmit Hazay and Jesper Buus
Nielsen and Peter Sebastian Nordholt and Angela
Zottarel",
title = "Signature Schemes Secure Against Hard-to-Invert
Leakage",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "2",
pages = "422--455",
month = apr,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9197-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 7 17:41:46 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-015-9197-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2016:FCC,
author = "Yehuda Lindell",
title = "Fast Cut-and-Choose-Based Protocols for Malicious and
Covert Adversaries",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "2",
pages = "456--490",
month = apr,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9198-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 7 17:41:46 MST 2016",
bibsource = "http://link.springer.com/journal/145/29/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-015-9198-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Moran:2016:OFC,
author = "Tal Moran and Moni Naor and Gil Segev",
title = "An Optimally Fair Coin Toss",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "3",
pages = "491--513",
month = jul,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9199-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon May 30 06:40:00 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-015-9199-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2016:LRC,
author = "Carmit Hazay and Adriana L{\'o}pez-Alt and Hoeteck Wee
and Daniel Wichs",
title = "Leakage-Resilient Cryptography from Minimal
Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "3",
pages = "514--551",
month = jul,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9200-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon May 30 06:40:00 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-015-9200-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Applebaum:2016:GXG,
author = "Benny Applebaum",
title = "Garbling {XOR} Gates ''For Free'' in the Standard
Model",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "3",
pages = "552--576",
month = jul,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9201-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon May 30 06:40:00 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-015-9201-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Applebaum:2016:DLS,
author = "Benny Applebaum and Andrej Bogdanov and Alon Rosen",
title = "A Dichotomy for Local Small-Bias Generators",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "3",
pages = "577--596",
month = jul,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9202-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon May 30 06:40:00 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-015-9202-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abdalla:2016:TSS,
author = "Michel Abdalla and Pierre-Alain Fouque and Vadim
Lyubashevsky and Mehdi Tibouchi",
title = "Tightly Secure Signatures From Lossy Identification
Schemes",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "3",
pages = "597--631",
month = jul,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9203-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon May 30 06:40:00 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-015-9203-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Coron:2016:PCI,
author = "Jean-S{\'e}bastien Coron and David Naccache and Mehdi
Tibouchi and Ralf-Philipp Weinmann",
title = "Practical Cryptanalysis of {ISO 9796-2} and {EMV}
Signatures",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "3",
pages = "632--656",
month = jul,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9205-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon May 30 06:40:00 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/article/10.1007/s00145-015-9205-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Andreeva:2016:NSP,
author = "Elena Andreeva and Charles Bouillaguet and Orr
Dunkelman and Pierre-Alain Fouque and Jonathan Hoch and
John Kelsey and Adi Shamir and S{\'e}bastien Zimmer",
title = "New Second-Preimage Attacks on Hash Functions",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "4",
pages = "657--696",
month = oct,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9206-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 12 07:07:07 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/4;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9206-4;
http://link.springer.com/article/10.1007/s00145-015-9206-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dinur:2016:KRA,
author = "Itai Dinur and Orr Dunkelman and Nathan Keller and Adi
Shamir",
title = "Key Recovery Attacks on Iterated {Even--Mansour}
Encryption Schemes",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "4",
pages = "697--728",
month = oct,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9207-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 12 07:07:07 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9207-3;
http://link.springer.com/article/10.1007/s00145-015-9207-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Boyen:2016:UAR,
author = "Xavier Boyen",
title = "Unconditionally Anonymous Ring and Mesh Signatures",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "4",
pages = "729--774",
month = oct,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9208-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 12 07:07:07 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9208-2;
http://link.springer.com/article/10.1007/s00145-015-9208-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Biham:2016:BA,
author = "Eli Biham and Yaniv Carmeli and Adi Shamir",
title = "Bug Attacks",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "4",
pages = "775--805",
month = oct,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9209-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 12 07:07:07 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/4;
https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9209-1;
http://link.springer.com/article/10.1007/s00145-015-9209-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
keywords = "Bug attack; ElGamal encryption; Fault attack; Pohlig
Hellman; RSA",
remark = "From the abstract: ``The best-known example of such a
bug is the Intel division bug, which resulted in
slightly inaccurate results for extremely rare inputs.
\ldots{} such bugs can be a security disaster:
decrypting ciphertexts on any computer which [sic]
multiplies even one pair of numbers incorrectly can
lead to full leakage of the secret key, sometimes with
a single well-chosen ciphertext.",
}
@Article{Smith:2016:CCE,
author = "Benjamin Smith",
title = "The $ \mathbb {Q}$-curve Construction for
Endomorphism-Accelerated Elliptic Curves",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "4",
pages = "806--832",
month = oct,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9210-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 12 07:07:07 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9210-8;
http://link.springer.com/article/10.1007/s00145-015-9210-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abe:2016:CSS,
author = "Masayuki Abe and Melissa Chase and Bernardo David and
Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo",
title = "Constant-Size Structure-Preserving Signatures:
Generic Constructions and Simple Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "4",
pages = "833--878",
month = oct,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9211-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 12 07:07:07 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9211-7;
http://link.springer.com/article/10.1007/s00145-015-9211-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Asharov:2016:TGT,
author = "Gilad Asharov and Ran Canetti and Carmit Hazay",
title = "Toward a Game Theoretic View of Secure Computation",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "4",
pages = "879--926",
month = oct,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9212-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 12 07:07:07 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9212-6;
http://link.springer.com/article/10.1007/s00145-015-9212-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Landelle:2016:CFR,
author = "Franck Landelle and Thomas Peyrin",
title = "Cryptanalysis of Full {RIPEMD-128}",
journal = j-J-CRYPTOLOGY,
volume = "29",
number = "4",
pages = "927--951",
month = oct,
year = "2016",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9213-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Sep 12 07:07:07 MDT 2016",
bibsource = "http://link.springer.com/journal/145/29/4;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9213-5;
http://link.springer.com/article/10.1007/s00145-015-9213-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
remark = "From the abstract: ``Overall, we present the first
collision attack on the full RIPEMD-128 compression
function as well as the first distinguisher on the full
RIPEMD-128 hash function. \ldots{} Our results show
that 16-year-old RIPEMD-128, one of the last unbroken
primitives belonging to the MD-SHA family, might not be
as secure as originally thought.''",
}
@Article{Winter:2017:WLC,
author = "Andreas Winter",
title = "Weak Locking Capacity of Quantum Channels Can be Much
Larger Than Private Capacity",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "1",
pages = "1--21",
month = jan,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9215-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 14 08:39:12 MST 2017",
bibsource = "http://link.springer.com/journal/145/30/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9215-3;
http://link.springer.com/article/10.1007/s00145-015-9215-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cash:2017:DPR,
author = "David Cash and Alptekin K{\"u}p{\c{c}}{\"u} and Daniel
Wichs",
title = "Dynamic Proofs of Retrievability Via Oblivious {RAM}",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "1",
pages = "22--57",
month = jan,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9216-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 14 08:39:12 MST 2017",
bibsource = "http://link.springer.com/journal/145/30/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9216-2;
http://link.springer.com/article/10.1007/s00145-015-9216-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Asharov:2017:FPB,
author = "Gilad Asharov and Yehuda Lindell",
title = "A Full Proof of the {BGW} Protocol for Perfectly
Secure Multiparty Computation",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "1",
pages = "58--151",
month = jan,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9214-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 14 08:39:12 MST 2017",
bibsource = "http://link.springer.com/journal/145/30/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9214-4;
http://link.springer.com/article/10.1007/s00145-015-9214-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
keywords = "Ben-Or, Goldwasser, and Wigderson (BGW) [1988 protocol
for perfect secure computation]",
}
@Article{Damgaard:2017:BTR,
author = "Ivan Damg{\aa}rd and Sebastian Faust and Pratyay
Mukherjee and Daniele Venturi",
title = "Bounded Tamper Resilience: How to Go Beyond the
Algebraic Barrier",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "1",
pages = "152--190",
month = jan,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9218-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 14 08:39:12 MST 2017",
bibsource = "http://link.springer.com/journal/145/30/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9218-0;
http://link.springer.com/article/10.1007/s00145-015-9218-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cheraghchi:2017:NMC,
author = "Mahdi Cheraghchi and Venkatesan Guruswami",
title = "Non-malleable Coding Against Bit-Wise and Split-State
Tampering",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "1",
pages = "191--241",
month = jan,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9219-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 14 08:39:12 MST 2017",
bibsource = "http://link.springer.com/journal/145/30/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9219-z;
http://link.springer.com/article/10.1007/s00145-015-9219-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Escala:2017:AFD,
author = "Alex Escala and Gottfried Herold and Eike Kiltz and
Carla R{\`a}fols and Jorge Villar",
title = "An Algebraic Framework for {Diffie--Hellman}
Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "1",
pages = "242--288",
month = jan,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9220-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 14 08:39:12 MST 2017",
bibsource = "http://link.springer.com/journal/145/30/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9220-6;
http://link.springer.com/article/10.1007/s00145-015-9220-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Brakerski:2017:OC,
author = "Zvika Brakerski and Guy N. Rothblum",
title = "Obfuscating Conjunctions",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "1",
pages = "289--320",
month = jan,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9221-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 14 08:39:12 MST 2017",
bibsource = "http://link.springer.com/journal/145/30/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9221-5;
http://link.springer.com/article/10.1007/s00145-015-9221-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2017:EOS,
author = "Carmit Hazay and Arpita Patra",
title = "Efficient One-Sided Adaptively Secure Computation",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "1",
pages = "321--371",
month = jan,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9222-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 14 08:39:12 MST 2017",
bibsource = "http://link.springer.com/journal/145/30/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9222-4;
http://link.springer.com/article/10.1007/s00145-015-9222-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Homma:2017:DMV,
author = "Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura
and Daisuke Fujimoto and Makoto Nagata and Takafumi
Aoki",
title = "Design Methodology and Validity Verification for a
Reactive Countermeasure Against {EM} Attacks",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "2",
pages = "373--391",
month = apr,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9223-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 13 09:18:10 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9223-3;
http://link.springer.com/article/10.1007/s00145-015-9223-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Genkin:2017:AC,
author = "Daniel Genkin and Adi Shamir and Eran Tromer",
title = "Acoustic Cryptanalysis",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "2",
pages = "392--443",
month = apr,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9224-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 13 09:18:10 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9224-2;
http://link.springer.com/article/10.1007/s00145-015-9224-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Komargodski:2017:SSN,
author = "Ilan Komargodski and Moni Naor and Eylon Yogev",
title = "Secret-Sharing for {NP}",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "2",
pages = "444--469",
month = apr,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9226-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 13 09:18:10 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9226-0;
http://link.springer.com/article/10.1007/s00145-015-9226-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Schroder:2017:SBS,
author = "Dominique Schr{\"o}der and Dominique Unruh",
title = "Security of Blind Signatures Revisited",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "2",
pages = "470--494",
month = apr,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-015-9225-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 13 09:18:10 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-015-9225-1;
http://link.springer.com/article/10.1007/s00145-015-9225-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lee:2017:STD,
author = "Jooyoung Lee and Martijn Stam and John Steinberger",
title = "The Security of {Tandem--DM} in the Ideal Cipher
Model",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "2",
pages = "495--518",
month = apr,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9230-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 13 09:18:10 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-016-9230-z;
http://link.springer.com/article/10.1007/s00145-016-9230-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Benhamouda:2017:ECP,
author = "Fabrice Benhamouda and Javier Herranz and Marc Joye
and Beno{\^\i}t Libert",
title = "Efficient Cryptosystems From $ \mathbf{2}^{\vec{k}}
$-th Power Residue Symbols",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "2",
pages = "519--549",
month = apr,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9229-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 13 09:18:10 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-016-9229-5;
http://link.springer.com/article/10.1007/s00145-016-9229-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Tajik:2017:PSC,
author = "Shahin Tajik and Enrico Dietz and Sven Frohmann and
Helmar Dittrich and Dmitry Nedospasov and Clemens
Helfmeier and Jean-Pierre Seifert and Christian Boit
and Heinz-Wilhelm H{\"u}bers",
title = "Photonic Side-Channel Analysis of Arbiter {PUFs}",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "2",
pages = "550--571",
month = apr,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9228-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 13 09:18:10 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-016-9228-6;
http://link.springer.com/article/10.1007/s00145-016-9228-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hisil:2017:JCG,
author = "Huseyin Hisil and Craig Costello",
title = "{Jacobian} Coordinates on Genus $2$ Curves",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "2",
pages = "572--600",
month = apr,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9227-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Mar 13 09:18:10 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s00145-016-9227-7;
http://link.springer.com/article/10.1007/s00145-016-9227-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Prabhakaran:2017:RNM,
author = "Manoj Prabhakaran and Mike Rosulek",
title = "Reconciling Non-malleability with Homomorphic
Encryption",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "3",
pages = "601--671",
month = jul,
year = "2017",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Jul 21 11:14:03 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Applebaum:2017:LCU,
author = "Benny Applebaum and Yoni Moses",
title = "Locally Computable {UOWHF} with Linear Shrinkage",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "3",
pages = "672--698",
month = jul,
year = "2017",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Jul 21 11:14:03 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
note = "See correction \cite{Applebaum:2023:CLC}.",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Barak:2017:MKA,
author = "Boaz Barak and Mohammad Mahmoody",
title = "{Merkle}'s Key Agreement Protocol is Optimal: An {$
O(n^2) $} Attack on Any Key Agreement from Random
Oracles",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "3",
pages = "699--734",
month = jul,
year = "2017",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Jul 21 11:14:03 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Seo:2017:SSD,
author = "Jae Hong Seo",
title = "Short Signatures from {Diffie--Hellman}: Realizing
Almost Compact Public Key",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "3",
pages = "735--759",
month = jul,
year = "2017",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Jul 21 11:14:03 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lenstra:2017:LS,
author = "H. W. {Lenstra, Jr.} and A. Silverberg",
title = "Lattices with Symmetry",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "3",
pages = "760--804",
month = jul,
year = "2017",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Jul 21 11:14:03 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Asharov:2017:MEO,
author = "Gilad Asharov and Yehuda Lindell and Thomas Schneider
and Michael Zohner",
title = "More Efficient Oblivious Transfer Extensions",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "3",
pages = "805--858",
month = jul,
year = "2017",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Jul 21 11:14:03 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Blondeau:2017:DLC,
author = "C{\'e}line Blondeau and Gregor Leander and Kaisa
Nyberg",
title = "Differential--Linear Cryptanalysis Revisited",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "3",
pages = "859--888",
month = jul,
year = "2017",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Jul 21 11:14:03 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kiltz:2017:IRO,
author = "Eike Kiltz and Adam O'Neill and Adam Smith",
title = "Instantiability of {RSA--OAEP} Under Chosen--Plaintext
Attack",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "3",
pages = "889--919",
month = jul,
year = "2017",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Jul 21 11:14:03 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Todo:2017:ICF,
author = "Yosuke Todo",
title = "Integral Cryptanalysis on Full {MISTY1}",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "3",
pages = "920--959",
month = jul,
year = "2017",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri Jul 21 11:14:03 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Applebaum:2017:PSM,
author = "Benny Applebaum and Pavel Raykov",
title = "From Private Simultaneous Messages to
Zero--Information {Arthur--Merlin} Protocols and Back",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "4",
pages = "961--988",
month = oct,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9239-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sun Oct 1 10:36:31 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9239-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bitansky:2017:HS,
author = "Nir Bitansky and Ran Canetti and Alessandro Chiesa and
Shafi Goldwasser and Huijia Lin and Aviad Rubinstein
and Eran Tromer",
title = "The Hunting of the {SNARK}",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "4",
pages = "989--1066",
month = oct,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9241-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sun Oct 1 10:36:31 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9241-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jakobsen:2017:ITC,
author = "Sune K. Jakobsen",
title = "Information Theoretical Cryptogenography",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "4",
pages = "1067--1115",
month = oct,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9242-8;
https://doi.org/10.1007/s00145-016-9242-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sun Oct 1 10:36:31 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9242-8;
https://link.springer.com/content/pdf/10.1007/s00145-016-9242-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jutla:2017:SQA,
author = "Charanjit S. Jutla and Arnab Roy",
title = "Shorter Quasi-Adaptive {NIZK} Proofs for Linear
Subspaces",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "4",
pages = "1116--1156",
month = oct,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9243-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sun Oct 1 10:36:31 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9243-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cohen:2017:FVG,
author = "Ran Cohen and Yehuda Lindell",
title = "Fairness Versus Guaranteed Output Delivery in Secure
Multiparty Computation",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "4",
pages = "1157--1186",
month = oct,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9245-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sun Oct 1 10:36:31 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9245-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hajiabadi:2017:RCS,
author = "Mohammad Hajiabadi and Bruce M. Kapron",
title = "Reproducible Circularly Secure Bit Encryption:
Applications and Realizations",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "4",
pages = "1187--1237",
month = oct,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9246-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sun Oct 1 10:36:31 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9246-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kiltz:2017:EAH,
author = "Eike Kiltz and Krzysztof Pietrzak and Daniele Venturi
and David Cash and Abhishek Jain",
title = "Efficient Authentication from Hard Learning Problems",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "4",
pages = "1238--1275",
month = oct,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9247-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sun Oct 1 10:36:31 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9247-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jager:2017:ACC,
author = "Tibor Jager and Florian Kohlar and Sven Sch{\"a}ge and
J{\"o}rg Schwenk",
title = "Authenticated Confidential Channel Establishment and
the Security of {TLS--DHE}",
journal = j-J-CRYPTOLOGY,
volume = "30",
number = "4",
pages = "1276--1324",
month = oct,
year = "2017",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9248-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sun Oct 1 10:36:31 MDT 2017",
bibsource = "http://link.springer.com/journal/145/30/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9248-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Applebaum:2018:MLO,
author = "Benny Applebaum and Yuval Ishai and Eyal Kushilevitz",
title = "Minimizing Locality of One-Way Functions via
Semi-private Randomized Encodings",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "1--22",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9244-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9244-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Catalano:2018:PHM,
author = "Dario Catalano and Dario Fiore",
title = "Practical Homomorphic Message Authenticators for
Arithmetic Circuits",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "23--59",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9249-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9249-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Komargodski:2018:FER,
author = "Ilan Komargodski and Gil Segev and Eylon Yogev",
title = "Functional Encryption for Randomized Functionalities
in the Private-Key Setting from Minimal Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "60--100",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9250-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9250-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Boura:2018:MIP,
author = "Christina Boura and Virginie Lallemand and Mar{\'\i}a
Naya-Plasencia and Valentin Suder",
title = "Making the Impossible Possible",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "101--133",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-016-9251-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-016-9251-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Mironov:2018:IDP,
author = "Ilya Mironov and Omkant Pandey and Omer Reingold and
Gil Segev",
title = "Incremental Deterministic Public-Key Encryption",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "134--161",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9252-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9252-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gilboa:2018:HMQ,
author = "Shoni Gilboa and Shay Gueron and Ben Morris",
title = "How Many Queries are Needed to Distinguish a Truncated
Random Permutation from a Random Function?",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "162--171",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9253-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9253-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Choi:2018:BBC,
author = "Seung Geol Choi and Dana Dachman-Soled and Tal Malkin
and Hoeteck Wee",
title = "A Black-Box Construction of Non-malleable Encryption
from Semantically Secure Encryption",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "172--201",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9254-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9254-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Brakerski:2018:FPF,
author = "Zvika Brakerski and Gil Segev",
title = "Function-Private Functional Encryption in the
Private--Key Setting",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "202--225",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9255-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9255-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fujisaki:2018:AME,
author = "Eiichiro Fujisaki",
title = "All-But-Many Encryption",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "226--275",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9256-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9256-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kakvi:2018:OSP,
author = "Saqib A. Kakvi and Eike Kiltz",
title = "Optimal Security Proofs for Full Domain Hash,
Revisited",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "1",
pages = "276--306",
month = jan,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9257-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jan 6 08:36:05 MST 2018",
bibsource = "http://link.springer.com/journal/145/31/1;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9257-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abdalla:2018:RE,
author = "Michel Abdalla and Mihir Bellare and Gregory Neven",
title = "Robust Encryption",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "2",
pages = "307--350",
month = apr,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9258-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9258-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bruneau:2018:MHO,
author = "Nicolas Bruneau and Sylvain Guilley and Zakaria Najm
and Yannick Teglia",
title = "Multivariate High-Order Attacks of Shuffled Tables
Recomputation",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "2",
pages = "351--393",
month = apr,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9259-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9259-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Zhang:2018:PCB,
author = "Bin Zhang and Chao Xu and Dengguo Feng",
title = "Practical Cryptanalysis of {Bluetooth} Encryption with
Condition Masking",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "2",
pages = "394--433",
month = apr,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9260-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9260-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Brakerski:2018:MIF,
author = "Zvika Brakerski and Ilan Komargodski and Gil Segev",
title = "Multi-input Functional Encryption in the Private-Key
Setting: Stronger Security from Weaker Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "2",
pages = "434--520",
month = apr,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9261-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9261-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Morris:2018:DET,
author = "Ben Morris and Phillip Rogaway and Till Stegers",
title = "Deterministic Encryption with the {Thorp} Shuffle",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "2",
pages = "521--536",
month = apr,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9262-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9262-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2018:OPE,
author = "Carmit Hazay",
title = "Oblivious Polynomial Evaluation and Secure
Set-Intersection from Algebraic {PRFs}",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "2",
pages = "537--586",
month = apr,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9263-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9263-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cohen:2018:CSM,
author = "Ran Cohen and Iftach Haitner and Eran Omri and Lior
Rotem",
title = "Characterization of Secure Multiparty Computation
Without Broadcast",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "2",
pages = "587--609",
month = apr,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9264-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9264-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bai:2018:ISP,
author = "Shi Bai and Tancr{\`e}de Lepoint and Adeline
Roux-Langlois and Amin Sakzad and Damien Stehl{\'e} and
Ron Steinfeld",
title = "Improved Security Proofs in Lattice-Based
Cryptography: Using the {R{\'e}nyi} Divergence Rather
than the Statistical Distance",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "2",
pages = "610--640",
month = apr,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9265-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9265-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bar-On:2018:ESA,
author = "Achiya Bar-On and Eli Biham and Orr Dunkelman and
Nathan Keller",
title = "Efficient Slide Attacks",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "3",
pages = "641--670",
month = jul,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9266-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9266-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2018:CST,
author = "Yehuda Lindell and Eran Omri and Hila Zarosim",
title = "Completeness for Symmetric Two-Party Functionalities:
Revisited",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "3",
pages = "671--697",
month = jul,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9267-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9267-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Asharov:2018:COW,
author = "Gilad Asharov and Gil Segev",
title = "On Constructing One-Way Permutations from
Indistinguishability Obfuscation",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "3",
pages = "698--736",
month = jul,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9268-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9268-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2018:FEO,
author = "Yehuda Lindell and Hila Zarosim",
title = "On the Feasibility of Extending Oblivious Transfer",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "3",
pages = "737--773",
month = jul,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9269-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9269-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lyubashevsky:2018:AEL,
author = "Vadim Lyubashevsky and Daniele Micciancio",
title = "Asymptotically Efficient Lattice-Based Digital
Signatures",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "3",
pages = "774--797",
month = jul,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9270-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9270-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Gueron:2018:FGC,
author = "Shay Gueron and Yehuda Lindell and Ariel Nof and Benny
Pinkas",
title = "Fast Garbling of Circuits Under Standard Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "3",
pages = "798--844",
month = jul,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9271-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9271-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Minaud:2018:KRA,
author = "Brice Minaud and Patrick Derbez and Pierre-Alain
Fouque and Pierre Karpman",
title = "Key-Recovery Attacks on {ASASA}",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "3",
pages = "845--884",
month = jul,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9272-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9272-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canteaut:2018:SCP,
author = "Anne Canteaut and Sergiu Carpov and Caroline Fontaine
and Tancr{\`e}de Lepoint and Mar{\'\i}a Naya-Plasencia
and Pascal Paillier and Renaud Sirdey",
title = "Stream Ciphers: A Practical Solution for Efficient
Homomorphic-Ciphertext Compression",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "3",
pages = "885--916",
month = jul,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9273-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/3;
https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9273-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abdalla:2018:RKS,
author = "Michel Abdalla and Fabrice Benhamouda and Alain
Passel{\`e}gue and Kenneth G. Paterson",
title = "Related-Key Security for Pseudorandom Functions Beyond
the Linear Barrier",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "4",
pages = "917--964",
month = oct,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9274-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9274-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Unruh:2018:EMP,
author = "Dominique Unruh",
title = "Everlasting Multi-party Computation",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "4",
pages = "965--1011",
month = oct,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9278-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9278-z;
https://link.springer.com/content/pdf/10.1007/s00145-018-9278-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Raghunathan:2018:DPK,
author = "Ananth Raghunathan and Gil Segev and Salil Vadhan",
title = "Deterministic Public-Key Encryption for
Adaptively-Chosen Plaintext Distributions",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "4",
pages = "1012--1063",
month = oct,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9287-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9287-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Chen:2018:MTR,
author = "Shan Chen and Rodolphe Lampe and Jooyoung Lee and
Yannick Seurin and John Steinberger",
title = "Minimizing the Two-Round Even-{Mansour} Cipher",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "4",
pages = "1064--1119",
month = oct,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9295-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9295-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hofheinz:2018:IPE,
author = "Dennis Hofheinz and J{\"o}rn M{\"u}ller-Quade and
Dominique Unruh",
title = "On the (Im-)Possibility of Extending Coin Toss",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "4",
pages = "1120--1163",
month = oct,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9296-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9296-x;
https://link.springer.com/content/pdf/10.1007/s00145-018-9296-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hutter:2018:FMP,
author = "Michael Hutter and Erich Wenger",
title = "Fast Multi-precision Multiplication for Public-Key
Cryptography on Embedded Microprocessors",
journal = j-J-CRYPTOLOGY,
volume = "31",
number = "4",
pages = "1164--1182",
month = oct,
year = "2018",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9298-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Sep 26 09:58:08 MDT 2018",
bibsource = "http://link.springer.com/journal/145/31/4;
https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9298-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hermelin:2019:MLC,
author = "Miia Hermelin and Joo Yeon Cho and Kaisa Nyberg",
title = "Multidimensional Linear Cryptanalysis",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "1",
pages = "1--34",
month = jan,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9308-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9308-x;
https://link.springer.com/content/pdf/10.1007/s00145-018-9308-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bai:2019:ICA,
author = "Shi Bai and Steven D. Galbraith and Liangze Li and
Daniel Sheffield",
title = "Improved Combinatorial Algorithms for the
Inhomogeneous Short Integer Solution Problem",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "1",
pages = "35--83",
month = jan,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9304-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9304-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abdalla:2019:TFS,
author = "Michel Abdalla and Fabrice Benhamouda and David
Pointcheval",
title = "On the Tightness of Forward-Secure Signature
Reductions",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "1",
pages = "84--150",
month = jan,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9283-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9283-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Duc:2019:ULM,
author = "Alexandre Duc and Stefan Dziembowski and Sebastian
Faust",
title = "Unifying Leakage Models: From Probing Attacks to Noisy
Leakage",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "1",
pages = "151--177",
month = jan,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9284-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9284-1;
https://link.springer.com/content/pdf/10.1007/s00145-018-9284-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kiyoshima:2019:REB,
author = "Susumu Kiyoshima",
title = "Round-Efficient Black-Box Construction of Composable
Multi-Party Computation",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "1",
pages = "178--238",
month = jan,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9276-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9276-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abe:2019:ISP,
author = "Masayuki Abe and Jan Camenisch and Rafael Dowsley and
Maria Dubovitskaya",
title = "On the Impossibility of Structure-Preserving
Deterministic Primitives",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "1",
pages = "239--264",
month = jan,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9292-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9292-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2019:ERK,
author = "Carmit Hazay and Gert L{\ae}ss{\o}e Mikkelsen and Tal
Rabin and Tomas Toft and Angelo Agatino Nicolosi",
title = "Efficient {RSA} Key Generation and Threshold
{Paillier} in the Two-Party Setting",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "2",
pages = "265--323",
month = apr,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-017-9275-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-017-9275-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Barthe:2019:AAC,
author = "Gilles Barthe and Edvard Fagerholm and Dario Fiore and
John Mitchell and Andre Scedrov and Benedikt Schmidt",
title = "Automated Analysis of Cryptographic Assumptions in
Generic Group Models",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "2",
pages = "324--360",
month = apr,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9302-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9302-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Berman:2019:HPR,
author = "Itay Berman and Iftach Haitner and Ilan Komargodski
and Moni Naor",
title = "Hardness-Preserving Reductions via Cuckoo Hashing",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "2",
pages = "361--392",
month = apr,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9293-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/2;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9293-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kiyoshima:2019:NBB,
author = "Susumu Kiyoshima",
title = "Non-black-box Simulation in the Fully Concurrent
Setting, Revisited",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "2",
pages = "393--434",
month = apr,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-09309-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-09309-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bernard:2019:PSM,
author = "Florent Bernard and Patrick Haddad and Viktor Fischer
and Jean Nicolai",
title = "From Physical to Stochastic Modeling of a {TERO}-Based
{TRNG}",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "2",
pages = "435--458",
month = apr,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9291-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9291-2;
https://link.springer.com/content/pdf/10.1007/s00145-018-9291-2.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
keywords = "transition effect ring oscillator (TERO)-based true
random number generator",
}
@Article{Choi:2019:EUC,
author = "Seung Geol Choi and Jonathan Katz and Dominique
Schr{\"o}gder and Arkady Yerukhimovich and Hong-Sheng
Zhou",
title = "({Efficient}) Universally Composable Oblivious
Transfer Using a Minimal Number of Stateless Tokens",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "2",
pages = "459--497",
month = apr,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9288-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9288-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fuchsbauer:2019:SPS,
author = "Georg Fuchsbauer and Christian Hanser and Daniel
Slamanig",
title = "Structure-Preserving Signatures on Equivalence Classes
and Constant-Size Anonymous Credentials",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "2",
pages = "498--546",
month = apr,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9281-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9281-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cheon:2019:CCM,
author = "Jung Hee Cheon and Kyoohyung Han and Changmin Lee and
Hansol Ryu and Damien Stehl{\'e}",
title = "Cryptanalysis of the {CLT13} Multilinear Map",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "2",
pages = "547--565",
month = apr,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9307-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9307-y;
https://link.springer.com/content/pdf/10.1007/s00145-018-9307-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Fleischhacker:2019:TSP,
author = "Nils Fleischhacker and Tibor Jager and Dominique
Schr{\"o}der",
title = "On Tight Security Proofs for {Schnorr} Signatures",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "2",
pages = "566--599",
month = apr,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09311-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:06 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09311-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Brassard:2019:KEM,
author = "Gilles Brassard and Peter H{\o}yer and Kassem Kalach
and Marc Kaplan and Sophie Laplante and Louis Salvail",
title = "Key Establishment {\`a} la {Merkle} in a Quantum
World",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "601--634",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09317-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09317-z;
https://link.springer.com/content/pdf/10.1007/s00145-019-09317-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2019:BBC,
author = "Carmit Hazay and Muthuramakrishnan
Venkitasubramaniam",
title = "On Black-Box Complexity of Universally Composable
Security in the {CRS} Model",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "635--689",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09326-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09326-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cohen:2019:PTC,
author = "Ran Cohen and Sandro Coretti and Juan Garay and
Vassilis Zikas",
title = "Probabilistic Termination and Composability of
Cryptographic Protocols",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "690--741",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9279-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9279-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dachman-Soled:2019:LRP,
author = "Dana Dachman-Soled and S. Dov Gordon and Feng-Hao Liu
and Adam O'Neill and Hong-Sheng Zhou",
title = "Leakage Resilience from Program Obfuscation",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "742--824",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9286-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9286-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Zhandry:2019:ME,
author = "Mark Zhandry",
title = "The Magic of {ELFs}",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "825--866",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9289-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9289-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
keywords = "Extremely Lossy Function (ELF)",
}
@Article{Oliveira:2019:KCQ,
author = "Thomaz Oliveira and Julio L{\'o}pez and Daniel
Cervantes-V{\'a}zquez and Francisco
Rodr{\'{\i}}guez-Henr{\'{\i}}quez",
title = "{Koblitz} Curves over Quadratic Fields",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "867--894",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9294-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9294-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jovanovic:2019:BCS,
author = "Philipp Jovanovic and Atul Luykx and Bart Mennink and
Yu Sasaki and Kan Yasuda",
title = "Beyond Conventional Security in Sponge-Based
Authenticated Encryption Modes",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "895--940",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9299-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9299-7;
https://link.springer.com/content/pdf/10.1007/s00145-018-9299-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dachman-Soled:2019:ONR,
author = "Dana Dachman-Soled and Chang Liu and Charalampos
Papamanthou and Elaine Shi and Uzi Vishkin",
title = "Oblivious Network {RAM} and Leveraging Parallelism to
Achieve Obliviousness",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "941--972",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9301-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9301-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Abe:2019:EFS,
author = "Masayuki Abe and Jens Groth and Markulf Kohlweiss and
Miyako Ohkubo and Mehdi Tibouchi",
title = "Efficient Fully Structure-Preserving Signatures and
Shrinking Commitments",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "973--1025",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9300-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9300-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lindell:2019:ECR,
author = "Yehuda Lindell and Benny Pinkas and Nigel P. Smart and
Avishay Yanai",
title = "Efficient Constant-Round Multi-party Computation
Combining {BMR} and {SPDZ}",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "3",
pages = "1026--1069",
month = jul,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09322-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09322-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Lacerda:2019:CLR,
author = "Felipe G. Lacerda and Joseph M. Renes and Renato
Renner",
title = "Classical Leakage Resilience from Fault-Tolerant
Quantum Computation",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1071--1094",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09310-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09310-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bock:2019:WBC,
author = "Estuardo Alpirez Bock and Joppe W. Bos and Chris
Brzuska and Charles Hubain and Wil Michiels and
Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe
Teuwen and Alexander Treff",
title = "White-Box Cryptography: Don't Forget About Grey-Box
Attacks",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1095--1143",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09315-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09315-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2019:CRM,
author = "Carmit Hazay and Avishay Yanai",
title = "Constant-Round Maliciously Secure Two-Party
Computation in the {RAM} Model",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1144--1199",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09321-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09321-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2019:WSC,
author = "Carmit Hazay and Muthuramakrishnan
Venkitasubramaniam",
title = "What Security Can We Achieve Within 4 Rounds?",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1200--1262",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09323-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09323-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Duc:2019:MMS,
author = "Alexandre Duc and Sebastian Faust and
Fran{\c{c}}ois-Xavier Standaert",
title = "Making Masking Security Proofs Concrete (Or How to
Evaluate the Security of Any Leaking Device), Extended
Version",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1263--1297",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9277-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9277-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Barbulescu:2019:UKS,
author = "Razvan Barbulescu and Sylvain Duquesne",
title = "Updating Key Size Estimations for Pairings",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1298--1336",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9280-5",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9280-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Takayasu:2019:SCE,
author = "Atsushi Takayasu and Yao Lu and Liqiang Peng",
title = "Small {CRT}-Exponent {RSA} Revisited",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1337--1382",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9282-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9282-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Todo:2019:NIA,
author = "Yosuke Todo and Gregor Leander and Yu Sasaki",
title = "Nonlinear Invariant Attack: Practical Attack on Full
{SCREAM}, {iSCREAM}, and {Midori64}",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1383--1422",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9285-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9285-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Chaigneau:2019:CNV,
author = "Colin Chaigneau and Thomas Fuhr and Henri Gilbert and
J{\'e}r{\'e}my Jean and Jean-Ren{\'e} Reinhard",
title = "Cryptanalysis of {NORX v2.0}",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1423--1447",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9297-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9297-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dinur:2019:EDB,
author = "Itai Dinur and Orr Dunkelman and Nathan Keller and Adi
Shamir",
title = "Efficient Dissection of Bicomposite Problems with
Cryptanalytic Applications",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1448--1490",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9303-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9303-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Okamoto:2019:FSF,
author = "Tatsuaki Okamoto and Katsuyuki Takashima",
title = "Fully Secure Functional Encryption with a Large Class
of Relations from the Decisional Linear Assumption",
journal = j-J-CRYPTOLOGY,
volume = "32",
number = "4",
pages = "1491--1573",
month = oct,
year = "2019",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9305-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Wed Oct 2 16:58:07 MDT 2019",
bibsource = "http://link.springer.com/journal/145/32/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9305-0;
https://link.springer.com/content/pdf/10.1007/s00145-018-9305-0.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Guo:2020:SLU,
author = "Qian Guo and Thomas Johansson and Carl L{\"o}ndahl",
title = "Solving {LPN} Using Covering Codes",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "1",
pages = "1--33",
month = jan,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09338-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09338-8;
https://link.springer.com/content/pdf/10.1007/s00145-019-09338-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Chillotti:2020:TFF,
author = "Ilaria Chillotti and Nicolas Gama and Mariya Georgieva
and Malika Izabach{\`e}ne",
title = "{TFHE}: Fast Fully Homomorphic Encryption Over the
Torus",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "1",
pages = "34--91",
month = jan,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09319-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09319-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Karati:2020:KGO,
author = "Sabyasachi Karati and Palash Sarkar",
title = "{Kummer} for Genus One Over Prime-Order Fields",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "1",
pages = "92--129",
month = jan,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09320-4",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09320-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Galbraith:2020:IPS,
author = "Steven D. Galbraith and Christophe Petit and Javier
Silva",
title = "Identification Protocols and Signature Schemes Based
on Supersingular Isogeny Problems",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "1",
pages = "130--175",
month = jan,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09316-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09316-0;
https://link.springer.com/content/pdf/10.1007/s00145-019-09316-0.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Akavia:2020:THC,
author = "Adi Akavia and Rio LaVigne and Tal Moran",
title = "Topology-Hiding Computation on All Graphs",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "1",
pages = "176--227",
month = jan,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09318-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09318-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Guo:2020:PCA,
author = "Jian Guo and Guohong Liao and Guozhen Liu and Meicheng
Liu and Kexin Qiao and Ling Song",
title = "Practical Collision Attacks against Round-Reduced
{SHA-3}",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "1",
pages = "228--270",
month = jan,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09313-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09313-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2020:PST,
author = "Carmit Hazay and Muthuramakrishnan
Venkitasubramaniam",
title = "On the Power of Secure Two-Party Computation",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "1",
pages = "271--318",
month = jan,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09314-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09314-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dachman-Soled:2020:LDU,
author = "Dana Dachman-Soled and Feng-Hao Liu and Elaine Shi and
Hong-Sheng Zhou",
title = "Locally Decodable and Updatable Non-malleable Codes
and Their Applications",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "1",
pages = "319--355",
month = jan,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-018-9306-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-018-9306-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bitansky:2020:COT,
author = "Nir Bitansky and Ryo Nishimaki and Alain
Passel{\`e}gue and Daniel Wichs",
title = "From Cryptomania to Obfustopia Through Secret-Key
Functional Encryption",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "2",
pages = "357--405",
month = apr,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09337-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09337-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Komargodski:2020:MOP,
author = "Ilan Komargodski and Gil Segev",
title = "From Minicrypt to Obfustopia via Private-Key
Functional Encryption",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "2",
pages = "406--458",
month = apr,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09327-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09327-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bitansky:2020:VRF,
author = "Nir Bitansky",
title = "Verifiable Random Functions from Non-interactive
Witness-Indistinguishable Proofs",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "2",
pages = "459--493",
month = apr,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09331-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09331-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Basin:2020:CGB,
author = "David A. Basin and Andreas Lochbihler and S. Reza
Sefidgar",
title = "{CryptHOL}: Game-Based Proofs in Higher-Order Logic",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "2",
pages = "494--566",
month = apr,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09341-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09341-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ashur:2020:RWK,
author = "Tomer Ashur and Tim Beyne and Vincent Rijmen",
title = "Revisiting the Wrong-Key-Randomization Hypothesis",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "2",
pages = "567--594",
month = apr,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09343-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09343-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dachman-Soled:2020:FIS,
author = "Dana Dachman-Soled and Nils Fleischhacker and Jonathan
Katz and Anna Lysyanskaya and Dominique Schr{\"o}der",
title = "Feasibility and Infeasibility of Secure Computation
with Malicious {PUFs}",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "2",
pages = "595--617",
month = apr,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09329-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 8 09:52:08 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09329-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kim:2020:MTP,
author = "Sam Kim and David J. Wu",
title = "Multi-theorem Preprocessing {NIZKs} from Lattices",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "619--702",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09324-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09324-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Chakraborti:2020:BBA,
author = "Avik Chakraborti and Tetsu Iwata and Kazuhiko
Minematsu and Mridul Nandi",
title = "Blockcipher-Based Authenticated Encryption: How Small
Can We Go?",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "703--741",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09325-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09325-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bao:2020:GAH,
author = "Zhenzhen Bao and Itai Dinur and Jian Guo and
Ga{\"e}tan Leurent and Lei Wang",
title = "Generic Attacks on Hash Combiners",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "742--823",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09328-w",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09328-w",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dinur:2020:ODD,
author = "Itai Dinur and Nathan Keller and Ohad Klein",
title = "An Optimal Distributed Discrete Log Protocol with
Applications to Homomorphic Secret Sharing",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "824--873",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09330-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09330-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dinur:2020:CTM,
author = "Itai Dinur",
title = "Cryptanalytic Time--Memory--Data Trade-offs for
{FX}-Constructions and the Affine Equivalence Problem",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "874--909",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09332-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09332-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Dunkelman:2020:PFA,
author = "Orr Dunkelman and Nathan Keller and Eran Lambooij and
Yu Sasaki",
title = "A Practical Forgery Attack on {Lilliput--AE}",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "910--916",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09333-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09333-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Applebaum:2020:CCP,
author = "Benny Applebaum and Thomas Holenstein and Manoj Mishra
and Ofer Shayevitz",
title = "The Communication Complexity of Private Simultaneous
Messages, Revisited",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "917--953",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09334-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09334-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kowalczyk:2020:CAS,
author = "Lucas Kowalczyk and Hoeteck Wee",
title = "Compact Adaptively Secure {ABE} for {$ \mathsf{NC}^1
$} from $k$-{Lin}",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "954--1002",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09335-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09335-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bar-On:2020:IKR,
author = "Achiya Bar-On and Orr Dunkelman and Nathan Keller and
Eyal Ronen and Adi Shamir",
title = "Improved Key Recovery Attacks on Reduced-Round {AES}
with Practical Data and Memory Complexities",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1003--1043",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09336-w",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09336-w",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kanukurthi:2020:FSN,
author = "Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and
Sruthi Sekar",
title = "Four-State Non-malleable Codes with Explicit Constant
Rate",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1044--1079",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09339-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09339-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Albrecht:2020:MMO,
author = "Martin R. Albrecht and Pooya Farshim and Shuai Han and
Dennis Hofheinz and Enrique Larraia and Kenneth G.
Paterson",
title = "Multilinear Maps from Obfuscation",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1080--1113",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09340-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09340-0;
https://link.springer.com/content/pdf/10.1007/s00145-019-09340-0.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Wegener:2020:SMR,
author = "Felix Wegener and Lauren {De Meyer} and Amir Moradi",
title = "Spin Me Right Round Rotational Symmetry for
{FPGA}-Specific {AES}: Extended Version",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1114--1155",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-019-09342-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-019-09342-y;
https://link.springer.com/content/pdf/10.1007/s00145-019-09342-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beyne:2020:BCI,
author = "Tim Beyne",
title = "Block Cipher Invariants as Eigenvectors of Correlation
Matrices",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1156--1183",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09344-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09344-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Derbez:2020:MMA,
author = "Patrick Derbez and L{\'e}o Perrin",
title = "Meet-in-the-Middle Attacks and Structural Analysis of
Round-Reduced {PRINCE}",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1184--1215",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09345-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09345-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Alhassan:2020:ESU,
author = "Masaud Y. Alhassan and Daniel G{\"u}nther and
{\'A}gnes Kiss and Thomas Schneider",
title = "Efficient and Scalable Universal Circuits",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1216--1271",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09346-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09346-z;
https://link.springer.com/content/pdf/10.1007/s00145-020-09346-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Jha:2020:TSC,
author = "Ashwin Jha and Mridul Nandi",
title = "Tight Security of Cascaded {LRW2}",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1272--1317",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09347-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09347-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kiyoshima:2020:SCN,
author = "Susumu Kiyoshima",
title = "Statistical Concurrent Non-Malleable Zero-Knowledge
from One-Way Functions",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1318--1361",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09348-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09348-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bunn:2020:OSA,
author = "Paul Bunn and Rafail Ostrovsky",
title = "Oblivious Sampling with Applications to Two-Party
$k$-Means Clustering",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "3",
pages = "1362--1403",
month = jul,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09349-w",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Sat Jul 25 08:24:36 MDT 2020",
bibsource = "http://link.springer.com/journal/145/33/3;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09349-w",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Libert:2020:ASN,
author = "Beno{\^\i}t Libert and Moti Yung",
title = "Adaptively Secure Non-interactive {CCA-Secure}
Threshold Cryptosystems: Generic Framework and
Constructions",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1405--1441",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09350-3",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09350-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hutter:2020:FMP,
author = "Michael Hutter and Erich Wenger",
title = "Fast Multi-precision Multiplication for Public-Key
Cryptography on Embedded Microprocessors",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1442--1460",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09351-2",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09351-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kusters:2020:IMS,
author = "Ralf K{\"u}sters and Max Tuengerthal and Daniel
Rausch",
title = "The {IITM} Model: A Simple and Expressive Model for
Universal Composability",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1461--1584",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09352-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09352-1;
https://link.springer.com/content/pdf/10.1007/s00145-020-09352-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kusters:2020:JSC,
author = "Ralf K{\"u}sters and Max Tuengerthal and Daniel
Rausch",
title = "Joint State Composition Theorems for Public-Key
Encryption and Digital Signature Functionalities with
Local Computation",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1585--1658",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09353-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09353-0;
https://link.springer.com/content/pdf/10.1007/s00145-020-09353-0.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Beimel:2020:SMC,
author = "Amos Beimel and Yehuda Lindell and Eran Omri and Ilan
Orlov",
title = "$ \vec {1 / p}$-Secure Multiparty Computation without
an Honest Majority and the Best of Both Worlds",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1659--1731",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09354-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09354-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Hazay:2020:LCC,
author = "Carmit Hazay and Peter Scholl and Eduardo
Soria-Vazquez",
title = "Low Cost Constant Round {MPC} Combining {BMR} and
Oblivious Transfer",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1732--1786",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09355-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09355-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Langrehr:2020:TSH,
author = "Roman Langrehr and Jiaxin Pan",
title = "Tightly Secure Hierarchical Identity-Based
Encryption",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1787--1821",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09356-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09356-x;
https://link.springer.com/content/pdf/10.1007/s00145-020-09356-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Bootle:2020:FFD,
author = "Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos
and Essam Ghadafi and Jens Groth",
title = "Foundations of Fully Dynamic Group Signatures",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1822--1870",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09357-w",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09357-w;
https://link.springer.com/content/pdf/10.1007/s00145-020-09357-w.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Inoue:2020:COA,
author = "Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and
Bertram Poettering",
title = "Cryptanalysis of {OCB2}: Attacks on Authenticity and
Confidentiality",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1871--1913",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09359-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09359-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Cohn-Gordon:2020:FSA,
author = "Katriel Cohn-Gordon and Cas Cremers and Benjamin
Dowling and Luke Garratt and Douglas Stebila",
title = "A Formal Security Analysis of the Signal Messaging
Protocol",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1914--1983",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09360-1",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09360-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Coretti:2020:NME,
author = "Sandro Coretti and Yevgeniy Dodis and Ueli Maurer and
Bj{\"o}rn Tackmann and Daniele Venturi",
title = "Non-malleable Encryption: Simpler, Shorter, Stronger",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "1984--2033",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09361-0",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09361-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Faust:2020:CNM,
author = "Sebastian Faust and Pratyay Mukherjee and Jesper Buus
Nielsen and Daniele Venturi",
title = "Continuously Non-malleable Codes in the Split-State
Model",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "2034--2077",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09362-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09362-z;
https://link.springer.com/content/pdf/10.1007/s00145-020-09362-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ullman:2020:PHG,
author = "Jonathan Ullman and Salil Vadhan",
title = "{PCPs} and the Hardness of Generating Synthetic Data",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "2078--2112",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09363-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09363-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Wesolowski:2020:EVD,
author = "Benjamin Wesolowski",
title = "Efficient Verifiable Delay Functions",
journal = j-J-CRYPTOLOGY,
volume = "33",
number = "4",
pages = "2113--2147",
month = oct,
year = "2020",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09364-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/33/4;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09364-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Rosen:2021:CPH,
author = "Alon Rosen and Gil Segev and Ido Shahaf",
title = "Can {PPAD} Hardness be Based on Standard Cryptographic
Assumptions?",
journal = j-J-CRYPTOLOGY,
volume = "34",
number = "1",
pages = "??--??",
month = jan,
year = "2021",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09369-6",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/34/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09369-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Halevi:2021:BH,
author = "Shai Halevi and Victor Shoup",
title = "Bootstrapping for {HElib}",
journal = j-J-CRYPTOLOGY,
volume = "34",
number = "1",
pages = "??--??",
month = jan,
year = "2021",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09368-7",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/34/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09368-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Zhandry:2021:QLN,
author = "Mark Zhandry",
title = "Quantum Lightning Never Strikes the Same State Twice.
Or: Quantum Money from Cryptographic Assumptions",
journal = j-J-CRYPTOLOGY,
volume = "34",
number = "1",
pages = "??--??",
month = jan,
year = "2021",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09372-x",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/34/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09372-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Katsumata:2021:TSP,
author = "Shuichi Katsumata and Shota Yamada and Takashi
Yamakawa",
title = "Tighter Security Proofs for {GPV--IBE} in the Quantum
Random Oracle Model",
journal = j-J-CRYPTOLOGY,
volume = "34",
number = "1",
pages = "??--??",
month = jan,
year = "2021",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09371-y",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/34/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09371-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Kaspers:2021:NAP,
author = "Christian Kaspers and Yue Zhou",
title = "The Number of Almost Perfect Nonlinear Functions Grows
Exponentially",
journal = j-J-CRYPTOLOGY,
volume = "34",
number = "1",
pages = "??--??",
month = jan,
year = "2021",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09373-w",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/34/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09373-w",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Rothblum:2021:TNI,
author = "Ron D. Rothblum and Adam Sealfon and Katerina
Sotiraki",
title = "Toward Non-interactive Zero-Knowledge Proofs for {NP}
from {LWE}",
journal = j-J-CRYPTOLOGY,
volume = "34",
number = "1",
pages = "??--??",
month = jan,
year = "2021",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09365-w",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/34/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09365-w",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Canetti:2021:RFE,
author = "Ran Canetti and Benjamin Fuller and Omer Paneth and
Leonid Reyzin and Adam Smith",
title = "Reusable Fuzzy Extractors for Low-Entropy
Distributions",
journal = j-J-CRYPTOLOGY,
volume = "34",
number = "1",
pages = "??--??",
month = jan,
year = "2021",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09367-8",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/34/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09367-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Ducas:2021:LSA,
author = "L{\'e}o Ducas and Yang Yu",
title = "Learning Strikes Again: The Case of the {DRS}
Signature Scheme",
journal = j-J-CRYPTOLOGY,
volume = "34",
number = "1",
pages = "??--??",
month = jan,
year = "2021",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-020-09366-9",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/34/1;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-020-09366-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
}
@Article{Applebaum:2021:OCC,
author = "Benny Applebaum and Zvika Brakerski",
title = "Obfuscating Circuits Via Composite-Order Graded
Encoding",
journal = j-J-CRYPTOLOGY,
volume = "34",
number = "2",
pages = "??--??",
month = apr,
year = "2021",
CODEN = "JOCREQ",
DOI = "https://doi.org/10.1007/s00145-021-09378-z",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Fri May 7 08:35:39 MDT 2021",
bibsource = "http://link.springer.com/journal/145/34/2;
https://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
URL = "https://link.springer.com/article/10.1007/s00145-021-0