%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.34",
%%%     date            = "19 April 2014",
%%%     time            = "14:52:05 MDT",
%%%     filename        = "jcryptology.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "33896 10838 39204 461746",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography, BibTeX, International
%%%                        Association for Cryptologic Research, Journal
%%%                        of Cryptology",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        Journal of Cryptology, the journal of the
%%%                        International Association for Cryptologic
%%%                        Research (CODEN JOCREQ, ISSN 0933-2790
%%%                        (printed version), 1432-1378 (electronic
%%%                        version)), published by Springer
%%%                        International.
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        1988, and the journal currently appears
%%%                        quarterly.  However, early volumes were split
%%%                        across years.
%%%
%%%                        The journal has a World-Wide Web site at
%%%
%%%                            http://link.springer.com/journal/volumesAndIssues/145
%%%                            http://link.springer.com/journal/145
%%%                            http://link.springer.de/link/service/journals/00145/
%%%                            http://link.springer-ny.com/link/service/journals/00145/
%%%
%%%                        with tables of contents and article abstracts
%%%                        for volume 9 (1996) to date.  Qualified
%%%                        subscribers may also access HTML, LaTeX, and
%%%                        PDF versions of the full text of articles
%%%                        from those volumes.  URLs to these online
%%%                        resources are provided in the entries below.
%%%
%%%                        Kevin McCurley maintains a Web site with the
%%%                        journal tables of contents at
%%%
%%%                            http://www.iacr.org/jofc/byvolume.html
%%%
%%%                        At version 1.34, the year coverage looked
%%%                        like this:
%%%
%%%                             1988 (  11)    1997 (  16)    2006 (  17)
%%%                             1989 (   5)    1998 (  17)    2007 (  21)
%%%                             1990 (  14)    1999 (  16)    2008 (  20)
%%%                             1991 (  22)    2000 (  20)    2009 (  20)
%%%                             1992 (  14)    2001 (  15)    2010 (  20)
%%%                             1993 (  15)    2002 (  16)    2011 (  26)
%%%                             1994 (  12)    2003 (  12)    2012 (  23)
%%%                             1995 (  13)    2004 (  15)    2013 (  24)
%%%                             1996 (  15)    2005 (  18)    2014 (  13)
%%%
%%%                             Article:        450
%%%
%%%                             Total entries:  450
%%%
%%%                        Data for the bibliography has been collected
%%%                        from the bibliographies in the TeX User Group
%%%                        collection, from bibliographies in the
%%%                        author's personal files, from the OCLC
%%%                        Contents1st database, from the Compendex
%%%                        database, and from the MathSciNet database.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.   Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume''.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================

@Preamble{
    "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:

@String{ack-ksm = "Kevin S. McCurley, email:
                 \path=mccurley@www.swcp.com="}

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:

@String{j-J-CRYPTOLOGY = "Journal of Cryptology: the journal of the
                          International Association for Cryptologic Research"}

%%% ====================================================================
%%% Bibliography entries:

@Article{Brickell:1988:E,
  author =       "E. F. Brickell",
  title =        "Editorial",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 10:28:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-ksm # " and " # ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kaliski:1988:DES,
  author =       "Burton S. {Kaliski, Jr.} and Ronald L. Rivest and Alan
                 T. Sherman",
  title =        "Is the {Data Encryption Standard} a Group? (Results of
                 Cycling Experiments on {DES})",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "1",
  pages =        "3--36",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "89f:94017",
  MRreviewer =   "Zhen Fu Cao",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-ksm # " and " # ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Stinson:1988:SCB,
  author =       "D. R. Stinson",
  title =        "Some Constructions and Bounds for Authentication
                 Codes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "1",
  pages =        "37--52 (or 37--51??)",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (90D05 94A29 94C30)",
  MRnumber =     "89e:94011",
  MRreviewer =   "Guy Jumarie",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-ksm # " and " # ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Beauchemin:1988:GRN,
  author =       "Pierre Beauchemin and Gilles Brassard and Claude
                 Cr{\'e}peau and Claude Goutier and Carl Pomerance",
  title =        "The Generation of Random Numbers that Are Probably
                 Prime",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "1",
  pages =        "53--64",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/BF00206325",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "11Y11 (11A51)",
  MRnumber =     "89g:11126",
  MRreviewer =   "Sun Qi",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-ksm # " and " # ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Chaum:1988:DCP,
  author =       "David Chaum",
  title =        "The Dining Cryptographers Problem: Unconditional
                 Sender and Recipient Untraceability",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "1",
  pages =        "65--75",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "89f:94014",
  MRreviewer =   "Yvo Desmedt",
  bibdate =      "Sat Oct 26 07:18:04 2002",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1021.html",
  acknowledgement = ack-ksm # " and " # ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "information hiding; steganography",
}

@Article{Feige:1988:ZKP,
  author =       "Uriel Feige and Amos Fiat and Adi Shamir",
  title =        "Zero-knowledge proofs of identity",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "2",
  pages =        "77--94",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68P25 92A25)",
  MRnumber =     "90g:94014",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Weizmann Inst of Science",
  affiliationaddress = "Rehovot, Isr",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Data Transmission; Identification
                 Schemes; Interactive Proofs of Knowledge; Secure
                 Communications; Zero-Knowledge Proofs",
}

@Article{McCurley:1988:KDS,
  author =       "Kevin S. McCurley",
  title =        "A key distribution system equivalent to factoring",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "2",
  pages =        "95--105",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "89k:94050",
  MRreviewer =   "Rudolf Lidl",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Southern California",
  affiliationaddress = "Los Angeles, CA, USA",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Data Transmission; Integer Factoring;
                 Key Distribution System; Public Key Cryptosystems;
                 Secure Communications; Signature Schemes",
}

@Article{Buchmann:1988:KES,
  author =       "Johannes Buchmann and H. C. Williams",
  title =        "A key-exchange system based on imaginary quadratic
                 fields",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "2",
  pages =        "107--118",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "11T71 (11R11 94A60)",
  MRnumber =     "90g:11166",
  MRreviewer =   "J. C. Lagarias",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ Duesseldorf",
  affiliationaddress = "Duesseldorf, West Ger",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Data Transmission; Imaginary Quadratic
                 Fields; Key-Exchange Systems; Secret Cryptographic
                 Fields; Secure Communications",
}

@Article{Stinson:1988:CAS,
  author =       "D. R. Stinson",
  title =        "A construction for authentication\slash secrecy codes
                 from certain combinatorial designs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "2",
  pages =        "119--127",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (05B30)",
  MRnumber =     "90e:94024",
  MRreviewer =   "Albrecht Beutelspacher",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Manitoba",
  affiliationaddress = "Winnipeg, Manit, Can",
  classification = "723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Authentication Codes; Codes, Symbolic; Cryptography;
                 Data Transmission; Mathematical
                 Techniques--Combinatorial Mathematics; Perpendicular
                 Arrays; Secrecy Codes; Secure Communications",
}

@Article{Beauchemin:1988:GHE,
  author =       "Pierre Beauchemin and Gilles Brassard",
  title =        "Generalization of {Hellman}'s extension to {Shannon}'s
                 approach to cryptography",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "2",
  pages =        "129--131",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (94A15)",
  MRnumber =     "89k:94041",
  bibdate =      "Mon Jul 19 08:51:15 1999",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ de Montreal",
  affiliationaddress = "Montreal, Que, Can",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Data Transmission; Information Theory;
                 Key Equivocation; Lower Bounds; Secure Communications;
                 Shannon Theory; Spurious Decipherments; Upper Bounds",
}

@Article{Tompa:1988:HSS,
  author =       "Martin Tompa and Heather Woll",
  title =        "How to share a secret with cheaters",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "2",
  pages =        "133--138",
  month =        "????",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68Q25 (68P25 94A60)",
  MRnumber =     "90c:68030",
  MRreviewer =   "Armin Cremers",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Thomas J. Watson Research Cent",
  affiliationaddress = "Yorktown Heights, NY, USA",
  classification = "723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cheating; Cryptography; Data Transmission;
                 Mathematical Techniques--Interpolation; Secret Sharing;
                 Secure Communications",
}

@Article{Koblitz:1989:HC,
  author =       "Neal Koblitz",
  title =        "Hyperelliptic cryptosystems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "3",
  pages =        "139--150",
  month =        "????",
  year =         "1989",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "11T71 (11G20 11Y40 14G15 94A60)",
  MRnumber =     "90k:11165",
  MRreviewer =   "Min Qiang Huang",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Washington",
  affiliationaddress = "Seattle, WA, USA",
  classification = "723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Discrete Logarithms; Finite Abelian
                 Groups; Hyperelliptic Cryptosystems; Jacobians;
                 Mathematical Techniques--Algebra; Public Key
                 Cryptosystems",
}

@Article{Luby:1989:SPS,
  author =       "Michael Luby and Charles Rackoff",
  title =        "A study of password security",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "3",
  pages =        "151--158",
  month =        "????",
  year =         "1989",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/BF02252873",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68P25 (68N25 68Q25 94A60)",
  MRnumber =     "91a:68053",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  abstract =     "We prove relationships between the security of a
                 function generator when used in an encryption scheme
                 and the security of a function generator when used in a
                 UNIX-like password scheme.",
  acknowledgement = ack-nhfb,
  affiliation =  "Int Computer Science Inst",
  affiliationaddress = "Berkeley, CA, USA",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Data Processing--Security of Data;
                 Password Security; Pseudorandom Function Generators;
                 UNIX",
}

@Article{Meier:1989:FCA,
  author =       "Willi Meier and Othmar Staffelbach",
  title =        "Fast correlation attacks on certain stream ciphers",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "3",
  pages =        "159--176",
  month =        "????",
  year =         "1989",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "90j:94029",
  MRreviewer =   "Zhao Zhi Zhang",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "HTL Brugg-Windisch",
  affiliationaddress = "Windisch, Switz",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Programming--Algorithms; Cryptanalysis;
                 Cryptography; Fast Correlation Attacks; Linear Feedback
                 Shift Register Sequences; Stream Ciphers",
}

@Article{Boyar:1989:ISP,
  author =       "Joan Boyar",
  title =        "Inferring sequences produced by a linear congruential
                 generator missing low-order bits",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "3",
  pages =        "177--184",
  month =        "????",
  year =         "1989",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/BF02252875",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (11B50 11T71 11Y16 65C10)",
  MRnumber =     "90g:94012",
  MRreviewer =   "Min Qiang Huang",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Chicago",
  affiliationaddress = "Chicago, IL, USA",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Programming--Algorithms; Cryptography; Linear
                 Congruential Method; Mathematical Statistics--Random
                 Number Generation; Pseudorandom Number Generators",
}

@Article{Piper:1989:LCS,
  author =       "Fred Piper and Michael Walker",
  title =        "Linear ciphers and spreads",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "3",
  pages =        "185--188",
  month =        "????",
  year =         "1989",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (51E23)",
  MRnumber =     "91g:94019",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of London",
  affiliationaddress = "Egham, Engl",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Block Ciphers; Cryptography; Linear Ciphers;
                 Projective Planes; Spreads",
}

@Article{Abadi:1990:SCE,
  author =       "Martin Abadi and Joan Feigenbaum",
  title =        "Secure circuit evaluation. {A} protocol based on
                 hiding information from an oracle",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "1",
  pages =        "1--12",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68Q25 (68M10 68P25 68Q05 94A60)",
  MRnumber =     "91f:68079",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "DEC Systems Research Cent",
  affiliationaddress = "Palo Alto, CA, USA",
  classification = "723; 731; 921; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Networks--Protocols; Cryptography; Data
                 Processing--Security of Data; Hiding Information From
                 Oracle; Information Theory; Mathematical
                 Techniques--Polynomials; Probability--Game Theory;
                 Secure Circuit Evaluation; Two-Party Protocols",
}

@Article{Nishimura:1990:PMM,
  author =       "Kazuo Nishimura and Masaaki Sibuya",
  title =        "Probability to meet in the middle",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "1",
  pages =        "13--22",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68P25 (60C05 94A60)",
  MRnumber =     "91f:68036",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Komazawa Univ",
  affiliationaddress = "Komazawa, Jpn",
  classification = "723; 731; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Authentication; Birthday Problem; Cryptography; Data
                 Encription Standard; Digests; Information Theory--Data
                 Compression; Mash Functions; Probability; Urn Models",
}

@Article{Stinson:1990:CAS,
  author =       "D. R. Stinson",
  title =        "The combinatorics of authentication and secrecy
                 codes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "1",
  pages =        "23--49",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (11T71 51E05 94A24)",
  MRnumber =     "91d:94015",
  MRreviewer =   "Ira S. Moskowitz",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Manitoba",
  affiliationaddress = "Winnipeg, Manit, Can",
  classification = "723; 731; 921; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Authentication Code; Codes, Symbolic--Encoding;
                 Combinatorial Design; Cryptography; Data
                 Processing--Security of Data; Information Theory;
                 Mathematical Techniques--Combinatorial Mathematics;
                 Probability; Secrecy Code",
}

@Article{Gong:1990:MKD,
  author =       "Li Gong and David J. Wheeler",
  title =        "A matrix key-distribution scheme",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "1",
  pages =        "51--59",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "91c:94021",
  MRreviewer =   "Henk Meijer",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Cambridge",
  affiliationaddress = "Cambridge, Engl",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Communication Security; Computer Networks;
                 Cryptography; Data Processing--Security of Data; Key
                 Distribution; Private Key Cipher; Session Key",
}

@Article{Boyar:1990:DLI,
  author =       "Joan F. Boyar and Stuart A. Kurtz and Mark W.
                 Krentel",
  title =        "Discrete logarithm implementation of perfect
                 zero-knowledge blobs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "2",
  pages =        "63--76",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68Q25 (68P25 94A60)",
  MRnumber =     "91m:68073",
  MRreviewer =   "Johan H{\aa}stad",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Chicago",
  affiliationaddress = "Chicago, IL, USA",
  classification = "723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Mathematical Techniques--Number Theory;
                 Product Blob; Zero Knowledge Blobs",
}

@Article{Simmons:1990:CPC,
  author =       "Gustavus J. Simmons",
  title =        "{Cartesian} product construction for unconditionally
                 secure authentication codes that permit arbitration",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "2",
  pages =        "77--104",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "92d:94021",
  MRreviewer =   "Yvo Desmedt",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Sandia Natl Lab",
  affiliationaddress = "Albuquerque, NM, USA",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Authentication Codes; Cartesian Product Construction;
                 Codes, Symbolic--Encoding; Cryptography",
}

@Article{Niederreiter:1990:CAP,
  author =       "Harald Niederreiter",
  title =        "Combinatorial approach to probabilistic results on the
                 linear-complexity profile of random sequences",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "2",
  pages =        "105--112",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (65C10)",
  MRnumber =     "91g:94018",
  MRreviewer =   "Jozef Vysko{\v{c}}",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Austrian Acad of Sciences, Inst for Information
                 Processing",
  affiliationaddress = "Vienna, Austria",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Complexity Profile; Cryptography; Linear Complexity;
                 Mathematical Statistics--Random Number Generation;
                 Probability--Random Processes",
}

@Article{Forre:1990:MID,
  author =       "R{\'e}jane Forr{\'e}",
  title =        "Methods and instruments for designing {$S$}-boxes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "3",
  pages =        "115--130",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94B35 (94A17)",
  MRnumber =     "92f:94024",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Swiss Federal Inst of Technology",
  affiliationaddress = "Zurich, Switz",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Metatheory--Boolean Functions; Conditional
                 Entropy; Cryptography; Probability--Random Processes;
                 S-Boxes; Walsh Transform",
}

@Article{Walker:1990:ITB,
  author =       "Michael Walker",
  title =        "Information-theoretic bounds for authentication
                 schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "3",
  pages =        "131--143",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "91g:94020",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Racal Research Ltd",
  affiliationaddress = "Berkshire, Engl",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Authentication Schemes; Codes, Symbolic--Encoding;
                 Cryptography; Encoding Rules; Incidence Structures;
                 Information Theory; Probability",
}

@Article{Murphy:1990:CFC,
  author =       "Sean Murphy",
  title =        "The cryptanalysis of {FEAL-}$4$ with 20 chosen
                 plaintexts",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "3",
  pages =        "145--154",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "91g:94017",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of London",
  affiliationaddress = "Surrey, Engl",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptanalysis; Cryptography; feal-4 Block Cipher;
                 Plaintexts",
}

@Article{Mitchell:1990:EBF,
  author =       "Chris Mitchell",
  title =        "Enumerating {Boolean} functions of cryptographic
                 significance",
  journal =      j-J-CRYPTOLOGY,
  volume =       "2",
  number =       "3",
  pages =        "155--170",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94B35 (94A05)",
  MRnumber =     "92f:94025",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of London",
  affiliationaddress = "Surrey, Engl",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Algorithm Design; Computer Metatheory--Boolean
                 Functions; Computer Programming--Algorithms;
                 Cryptography; Encryption Algorithms; Galois Fields",
}

@Article{Godlewski:1990:KMC,
  author =       "Philippe Godlewski and Chris Mitchell",
  title =        "Key-minimal cryptosystems for unconditional secrecy",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "1",
  pages =        "1--25",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "92f:94014",
  MRreviewer =   "Do Long Van",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Ecole Natl Sup{\'e}rieure des Telecommunications",
  affiliationaddress = "Fr",
  classification = "718; 723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Codes, Symbolic --- Encoding; Cryptography; Data
                 Processing --- Security of Data; L-Secrecy Systems;
                 Latin Squares; Mathematical Techniques --- Set Theory;
                 Perpendicular Arrays; Secrecy Codes",
}

@Article{Adams:1990:SDC,
  author =       "Carlisle Adams and Stafford Tavares",
  title =        "Structured design of cryptographically good
                 {$S$}-boxes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "1",
  pages =        "27--41",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "91j:94018",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Queen's Univ at Kingston",
  affiliationaddress = "Kingston, Ont, Can",
  classification = "716; 723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Metatheory --- Boolean Functions; Computer
                 Workstations; Cryptography; Data Encryption Standard
                 (des); Data Processing --- Security of Data;
                 Mathematical Techniques --- Algorithms; Nonlinearities;
                 S-Boxes; Strict Avalanche Criterion",
}

@Article{Merkle:1990:FSO,
  author =       "Ralph C. Merkle",
  title =        "A fast software one-way hash function",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "1",
  pages =        "43--58",
  month =        "????",
  year =         "1990",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68P25",
  MRnumber =     "91m:68041",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Xerox PARC",
  affiliationaddress = "Palo Alto, CA, USA",
  classification = "723; 731",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Codes, Symbolic --- Encoding; Computer Crime ---
                 Viruses; Computer Programming --- Algorithms; Computer
                 Software; Cryptography; Data Processing --- Security of
                 Data; Manipulation Detection Codes (mdcs); Message
                 Digest Algorithm; One-Way Hash Function; Snefru Hash
                 Function",
}

@Article{Berson:1991:GEI,
  author =       "T. A. Berson and R. A. Rueppel",
  title =        "{Guest Editor}'s Introduction",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "2",
  pages =        "61--62",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-ksm # " and " # ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Agnew:1991:IFP,
  author =       "G. B. Agnew and R. C. Mullin and I. M. Onyszchuk and
                 S. A. Vanstone",
  title =        "An implementation for a fast public-key cryptosystem",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "2",
  pages =        "63--79",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "92b:94034",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Waterloo",
  affiliationaddress = "Waterloo, Ont, Can",
  classification = "713; 714; 723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Galois Field; Integrated Circuits,
                 VLSI--applications; Mathematical
                 Techniques--Applications; Public-Key Cryptosystem",
}

@Article{Gaarder:1991:AFA,
  author =       "Klaus Gaarder and Einar Snekkenes",
  title =        "Applying a formal analysis technique to the {CCITT}
                 {X}.509 strong two-way authentication protocol",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "2",
  pages =        "81--98",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 113 371",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Norwegian Telecom Research Dep",
  affiliationaddress = "Kjeller, Norw",
  classification = "723; 902",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Authentication; Computer Networks; Cryptographic
                 Protocols; Cryptography; Digital Communication
                 Systems--Standards; Formal Methods; Protocols",
}

@Article{Haber:1991:HTD,
  author =       "Stuart Haber and W. Scott Stornetta",
  title =        "How to time-stamp a digital document",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "2",
  pages =        "99--111",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Bellcore",
  affiliationaddress = "Morristown, NJ, USA",
  classification = "723; 914",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Networks--Security Systems; Cryptography;
                 Data Processing--Security of Data; Time-Stamp",
}

@Article{Matyas:1991:KPC,
  author =       "Stephen M. Matyas",
  title =        "Key processing with control vectors",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "2",
  pages =        "113--136",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Corp",
  affiliationaddress = "Manassas, VA, USA",
  classification = "723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Data Encryption Algorithms; Encryption;
                 Mathematical Techniques--Algorithms",
}

@Article{Pastor:1991:CCA,
  author =       "Jose Pastor",
  title =        "{CRYPTOPOST}. {A} cryptographic application to mail
                 processing",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "2",
  pages =        "137--146",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Pitney Bowes Corp",
  affiliationaddress = "Stamford, CT, USA",
  classification = "691; 723; 914",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Applications; Authentication of Documents;
                 Cryptography; Digital Signature; Mail
                 Handling--Security Systems",
}

@Article{Lenstra:1991:CRK,
  author =       "H. W. {Lenstra, Jr.}",
  title =        "On the {Chor--Rivest} knapsack cryptosystem",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "3",
  pages =        "149--155",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "92j:94012",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California",
  affiliationaddress = "Berkeley, CA, USA",
  classification = "723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Chor--Rivest System; Computer Programming--Algorithms;
                 Computers--Computational Methods; Cryptography; Finite
                 Field; Mathematical Techniques--Finite Element Method;
                 Powerline System; Public-Key Cryptosystem",
}

@Article{Micali:1991:EPP,
  author =       "S. Micali and C. P. Schnorr",
  title =        "Efficient, perfect polynomial random number
                 generators",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "3",
  pages =        "157--172",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "65C10 (94A60)",
  MRnumber =     "92i:65020",
  MRreviewer =   "I. V{\u{a}}duva",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Massachusetts Inst of Technology",
  affiliationaddress = "Cambridge, MA, USA",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Programming--Algorithms; Cryptography;
                 Mathematical Statistics--Random Number Generation;
                 Perfect Generators; Polynomial Generators; Random
                 Number Generators (RNGs); rsa-scheme; Statistical
                 Methods",
}

@Article{DeSoete:1991:NBC,
  author =       "Marijke {De Soete}",
  title =        "New bounds and constructions for authentication\slash
                 secrecy codes with splitting",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "3",
  pages =        "173--186",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (05B25)",
  MRnumber =     "92j:94011",
  MRreviewer =   "Jennifer Seberry",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "MBLE-I.S.G",
  affiliationaddress = "Brussels, Belg",
  classification = "723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Authentication Codes; Codes, Symbolic; Combinatorial
                 Design; Cryptography; Mathematical Models; Mathematical
                 Techniques--Geometry; Partial Geometry",
}

@Article{Kaliski:1991:OWP,
  author =       "Burton S. {Kaliski, Jr.}",
  title =        "One-way permutations on elliptic curves",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "3",
  pages =        "187--199",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "11G07 (11T71 94A60)",
  MRnumber =     "92j:11054",
  MRreviewer =   "A. Peth{\"o}",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "RSA Data Security Inc",
  affiliationaddress = "Redwood City, CA, USA",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Programming--Algorithms; Cryptography;
                 Discrete Logarithms; Elliptic Curves; Mathematical
                 Statistics--Random Number Generation; One-Way
                 Functions",
}

@Article{Golic:1991:GCA,
  author =       "Jovan Dj. Goli{\'c} and Miodrag J. Mihaljevi{\'c}",
  title =        "Generalized correlation attack on a class of stream
                 ciphers based on the {Levenshtein} distance",
  journal =      j-J-CRYPTOLOGY,
  volume =       "3",
  number =       "3",
  pages =        "201--212",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "92g:94014",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Belgrade",
  affiliationaddress = "Beograd, Yugosl",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Clock-Controlled Shift Registers; Computer
                 Programming--Algorithms; Cryptography; Crytoanalysis;
                 Levenshtein Distance; Mathematical Statistics; Sequence
                 Comparison",
}

@Article{Brickell:1991:EI,
  author =       "E. F. Brickell",
  title =        "Editorial Introduction",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "1",
  pages =        "1--2",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-ksm # " and " # ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Biham:1991:DCL,
  author =       "Eli Biham and Adi Shamir",
  title =        "Differential cryptanalysis of {DES-like}
                 cryptosystems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "1",
  pages =        "3--72",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "93j:94020",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Weizmann Inst of Science",
  affiliationaddress = "Rehovot, Isr",
  classification = "723; 902",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptanalytic Attack; Cryptography; Data Encryption
                 Standard; Differential Cryptanalysis; Standards",
}

@Article{Feigenbaum:1991:GEI,
  author =       "J. Feigenbaum",
  title =        "{Guest Editor}'s Introduction",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "2",
  pages =        "73--73",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-ksm # " and " # ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Beaver:1991:SMP,
  author =       "D. Beaver",
  title =        "Secure Multiparty Protocols and Zero-Knowledge Proof
                 Systems Tolerating a Faulty Minority",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "2",
  pages =        "75--122",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 11:12:41 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Brickell:1991:CIS,
  author =       "E. F. Brickell and D. M. Davenport",
  title =        "On the Classification of Ideal Secret Sharing
                 Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "2",
  pages =        "123--134",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 11:12:41 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Maurer:1991:LRP,
  author =       "U. M. Maurer and J. L. Massey",
  title =        "Local Randomness in Pseudorandom Sequences",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "2",
  pages =        "135--149",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 11:12:41 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Naor:1991:BCU,
  author =       "M. Naor",
  title =        "Bit Commitment Using Pseudorandomness",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "2",
  pages =        "151--158",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 11:12:41 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Schnorr:1991:ESG,
  author =       "C.-P. Schnorr",
  title =        "Efficient Signature Generation by Smart Cards",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "3",
  pages =        "161--174",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 11:12:41 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Goutier:1991:SII,
  author =       "C. Goutier {S. Bengio, G. Brassard, Y. G. Desmedt} and
                 J.-J. Quisquater",
  title =        "Secure Implementations of Identification Systems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "3",
  pages =        "175--183",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 11:12:41 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Boyar:1991:PZK,
  author =       "Joan Boyar and Katalin Friedl and Carsten Lund",
  title =        "Practical Zero-Knowledge Proofs: Giving Hints and
                 Using Deficiencies",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "3",
  pages =        "185--206",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68T15 (94A60)",
  MRnumber =     "93m:68144",
  MRreviewer =   "Hans B. Sieburg",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  xxauthor =     "K. Friedl J. F. Boyar and C. Lund",
}

@Article{Koblitz:1991:ECI,
  author =       "Neal Koblitz",
  title =        "Elliptic Curve Implementations of Zero-Knowledge
                 Blobs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "4",
  number =       "3",
  pages =        "207--213",
  month =        "????",
  year =         "1991",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68Q25 (68R99 94A60)",
  MRnumber =     "93m:68080",
  MRreviewer =   "Johan H{\aa}stad",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  xxtitle =      "Elliptic curve implementation of zero-knowledge
                 blobs",
}

@Article{Damgaard:1992:P,
  author =       "I. B. Damg{\aa}rd",
  title =        "Preface",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "1",
  pages =        "1--1",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bennett:1992:EQC,
  author =       "Charles {Bennett, H.} and Fran{\c{c}}ois Bessette and
                 Gilles Brassard and Louis Salvail",
  title =        "Experimental quantum cryptography",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "1",
  pages =        "3--28",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Research",
  affiliationaddress = "New York, NY, USA",
  classification = "723; 931",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Data Processing --- Security of Data;
                 Evaluation; Key Distribution; Privacy Amplification;
                 Quantum Cryptography; Quantum Theory --- Applications;
                 Reconciliation Protocols; Uncertainty Principle;
                 Unconditional Security",
}

@Article{Brickell:1992:IIS,
  author =       "Ernest F. Brickell and Kevin S. McCurley",
  title =        "Interactive identification scheme based on discrete
                 logarithms and factoring",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "1",
  pages =        "29--39",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Sandia Natl Lab",
  affiliationaddress = "Albuquerque, NM, USA",
  classification = "722; 723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Programming --- Algorithms; Cryptography;
                 Digital Signatures; Evaluation; Interactive
                 Identification; Mathematical Techniques --- Number
                 Theory; Microprocessor Chips --- Smart Cards; Witness
                 Hiding",
}

@Article{Evertse:1992:WNR,
  author =       "Jan-Hendrik Evertse and Eug{\`e}ne {van Heyst}",
  title =        "Which new {RSA}-signatures can be computed from
                 certain given {RSA}-signatures?",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "1",
  pages =        "41--52",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "93g:94010",
  MRreviewer =   "Hirosuke Yamamoto",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Leiden",
  affiliationaddress = "Leiden, Neth",
  classification = "723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Analysis; Computer Programming --- Algorithms;
                 Cryptographic Protocol; Cryptography; Mathematical
                 Techniques --- Number Theory; rsa Signatures",
}

@Article{Maurer:1992:CPS,
  author =       "Ueli M. Maurer",
  title =        "Conditionally-perfect secrecy and a provably-secure
                 randomized cipher",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "1",
  pages =        "53--66",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 171 358",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "ETH Zurich",
  affiliationaddress = "Zurich, Switz",
  classification = "723",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Automata Theory --- Theorem Proving; Book Cipher;
                 Cryptography; Data Processing --- Security of Data;
                 Information Theory; Perfect Secrecy; Provable Security;
                 Public Randomness; Randomized Encryption; Theory",
}

@Article{Meier:1992:CPC,
  author =       "Willi Meier and Othmar Staffelbach",
  title =        "Correlation properties of combiners with memory in
                 stream ciphers",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "1",
  pages =        "67--86",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 171 359",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "HTL Brugg-Windisch",
  affiliationaddress = "Windisch, Switz",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Binary Sequences; Combiners; Computer Metatheory;
                 Computer Programming --- Algorithms; Cryptanalysis;
                 Cryptography --- Analysis; Information Theory ---
                 Correlation Theory; Linear Feedback Shift Registers
                 (lfsrs); Mathematical Statistics --- Random Number
                 Generation; Stream Cipher",
}

@Article{Maurer:1992:UST,
  author =       "Ueli M. Maurer",
  title =        "A universal statistical test for random bit
                 generators",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "2",
  pages =        "89--105",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "65C10 (68U20 94A60)",
  MRnumber =     "93e:65011",
  MRreviewer =   "I. V{\u{a}}duva",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "ETH Zuerich",
  affiliationaddress = "Zuerich, Switz",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptographic Badness; Cryptography; Ergodic
                 Stationary Source; Exhaustive Key Search; Mathematical
                 Statistics; Random Bit Generator; Random Number
                 Generation; Randomness; State Transition Probabilities;
                 Statistical Methods --- Statistical Tests",
}

@Article{Lloyd:1992:CBF,
  author =       "Sheelagh Lloyd",
  title =        "Counting binary functions with certain cryptographic
                 properties",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "2",
  pages =        "107--131",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "93e:94010",
  MRreviewer =   "Thomas W. Cusick",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Hewlett Packard Lab",
  affiliationaddress = "Bristol, Engl",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Balance Property; Binary Functions; Correlation
                 Immunity; Cryptographic Properties; Cryptography;
                 Information Theory --- Correlation Theory; Mathematical
                 Statistics --- Random Number Generation; Strict
                 Avalanche Criterion; Theory",
}

@Article{Georgiades:1992:SRS,
  author =       "Jean Georgiades",
  title =        "Some remarks on the security of the identification
                 scheme based on permuted kernels",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "2",
  pages =        "133--137",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 171 362",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Siemens AG",
  affiliationaddress = "M{\"u}nchen, Ger",
  classification = "723; 922",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography --- Theory; Game Theory; Permutations;
                 Permuted Kernels; Probability; Probability of Cheating;
                 Systems Science and Cybernetics --- Identification",
}

@Article{Loxton:1992:CRC,
  author =       "J. H. Loxton and David S. P. Khoo and Gregory J. Bird
                 and Jennifer Seberry",
  title =        "A cubic {RSA} code equivalent to factorization",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "2",
  pages =        "139--150",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "93c:94004",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Macquarie Univ",
  affiliationaddress = "Aust",
  classification = "723; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Programming --- Algorithms; Cryptography;
                 Cubic Residues; Data Processing --- Security of Data;
                 Eisenstein Integers; Encryption; Factorization;
                 Mathematical Techniques --- Number Theory; Public Key;
                 rsa Scheme; Theory",
}

@Article{Brickell:1992:SIB,
  author =       "E. F. Brickell and D. R. Stinson",
  title =        "Some improved bounds on the information rate of
                 perfect secret sharing schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "3",
  pages =        "153--166",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "93j:94021",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Sandia Natl Lab",
  affiliationaddress = "Albuquerque, NM, USA",
  classification = "716.1; 723.1; 723.2; 921.4",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Data structures; Graph theory; Ideal
                 secret sharing; Information rate; Information theory;
                 Perfect secret sharing; Secret sharing; Security of
                 data",
}

@Article{Magliveras:1992:APC,
  author =       "Spyros S. Magliveras and Nasir D. Memon",
  title =        "Algebraic properties of cryptosystem {PGM}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "3",
  pages =        "167--183",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "93h:94017",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Nebraska-Lincoln",
  affiliationaddress = "Lincoln, NE, USA",
  classification = "723.1; 723.2; 921.1; 921.3; 922.1",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Algebra; Cryptography; Data structures; Encoding
                 (symbols); Finite permutation group; Logarithmic
                 signatures; Mathematical transformations; Multiple
                 encryption; Number theory; Permutation group mappings
                 (pgm); Private key encryption; Probability; Security of
                 data",
}

@Article{Phillips:1992:SIS,
  author =       "Steven J. Phillips and Nicholas C. Phillips",
  title =        "Strongly ideal secret sharing schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "3",
  pages =        "185--191",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "93g:68031",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Computer Science Dep",
  affiliationaddress = "Stanford, CA, USA",
  classification = "716.1; 723.1; 723.2",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Access structures; Cryptography; Data structures;
                 Decoding; Encoding (symbols); Hierarchical systems;
                 Ideal schemes; Information theory; Perfect security;
                 Secret sharing; Security of data",
}

@Article{Dai:1992:BSD,
  author =       "Zong Duo Dai",
  title =        "Binary sequences derived from {ML}-sequences over
                 rings {I}: {Periods} and minimal polynomials",
  journal =      j-J-CRYPTOLOGY,
  volume =       "5",
  number =       "3",
  pages =        "193--207",
  month =        "????",
  year =         "1992",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68P25 (68Q40)",
  MRnumber =     "93g:68030",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of London",
  affiliationaddress = "Surrey, Engl",
  classification = "723.1; 723.2; 921.1",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Algebra; Binary sequences; Cryptography; Integral
                 rings; Maximal length sequences; Minimal polynomials;
                 Number theory; Periods; Polynomials; Random number
                 generation",
}

@Article{Brassard:1993:EN,
  author =       "G. Brassard",
  title =        "{Editor}'s Note",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "1",
  pages =        "1--1",
  month =        "Winter",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-ksm # " and " # ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Agnew:1993:AO,
  author =       "G. B. Agnew and T. Beth and R. C. Mullin and S. A.
                 Vanstone",
  title =        "Arithmetic operations in {$ {\rm GF}(2^m)$}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "1",
  pages =        "3--13",
  month =        "Winter",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "93m:94018",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Waterloo",
  affiliationaddress = "Waterloo, Ont, Can",
  classification = "721.1; 722.4; 723.1; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computation theory; Cryptography; Digital arithmetic;
                 Discrete exponentiation; Mathematical operators;
                 Multiplicative inverses; Normal basis; Parallel
                 processing systems; Public key cryptography",
}

@Article{Ito:1993:MAS,
  author =       "Mitsuru Ito and Akira Saito and Takao Nishizeki",
  title =        "Multiple assignment scheme for sharing secret",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "1",
  pages =        "15--20",
  month =        "Winter",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "94b:94018",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Mitsubishi Co",
  affiliationaddress = "Kanagawa, Jpn",
  classification = "721.1; 723.1; 723.2; 921.4",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Access structure; Cryptography; Data handling; Data
                 structures; Multiple assignment scheme; Secret sharing;
                 Security of data; Set theory; Sperner family; State
                 assignment; Theorem proving; Threshold scheme",
}

@Article{Goldreich:1993:UCT,
  author =       "Oded Goldreich",
  title =        "Uniform-Complexity Treatment of Encryption and
                 Zero-Knowledge",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "1",
  pages =        "21--53",
  month =        "Winter",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "94e:94013",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Technion",
  affiliationaddress = "Haifa, Isr",
  classification = "721.1; 723.1; 922.1",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Commitment schemes; Computational complexity;
                 Cryptography; Encryption; Probability; Security of
                 data; Theorem proving; Uniform complexity measures;
                 Zero knowledge",
}

@Article{Maurer:1993:CCI,
  author =       "Ueli M. Maurer and James L. Massey",
  title =        "Cascade ciphers: {The} importance of being first",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "1",
  pages =        "55--61",
  month =        "Winter",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "ETH Zurich",
  affiliationaddress = "Zurich, Switz",
  classification = "721.1; 723.1; 723.2",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cascade ciphers; Codes (symbols); Computational
                 complexity; Computational security; Cryptography;
                 Decoding; Multiple encryption; Provable security;
                 Security of data; Theorem proving",
}

@Article{Boyar:1993:CCZ,
  author =       "Joan Boyar and Carsten Lund and Ren{\'e} Peralta",
  title =        "On the communication complexity of zero-knowledge
                 proofs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "2",
  pages =        "65--85",
  month =        "Spring",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (03D15 68P25 68Q15)",
  MRnumber =     "94g:94017",
  MRreviewer =   "Xiang Li",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Chicago",
  affiliationaddress = "Chicago, IL, USA",
  classification = "716",
  conferenceyear = "1993",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Circuit theory; Circuit-based methods; Communication
                 complexity; Cryptographic protocols; Cryptography;
                 Zero-knowledge proofs",
  publisherinfo = "Service Center Secaucus",
  xxauthor =     "Joan Boyar and Carsten Lund",
}

@Article{Chor:1993:SSI,
  author =       "Benny Chor and Eyal Kushilevitz",
  title =        "Secret sharing over infinite domains",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "2",
  pages =        "87--95",
  month =        "Spring",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "94f:94006",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Technion",
  affiliationaddress = "Haifa, Isr",
  classification = "716",
  conferenceyear = "1993",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Encryption; Infinite domain secret
                 sharing; Private-key encryption schemes; Secret sharing
                 possibility",
  publisherinfo = "Service Center Secaucus",
}

@Article{Goldreich:1993:PZK,
  author =       "Oded Goldreich and Eyal Kushilevitz",
  title =        "A Perfect Zero-knowledge Proof System for a Problem
                 Equivalent to the Discrete Algorithm",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "2",
  pages =        "97--116",
  month =        "Spring",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "68T15 (68Q25 94A60)",
  MRnumber =     "94e:68152",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Technion",
  affiliationaddress = "Haifa, Isr",
  classification = "716; 921",
  conferenceyear = "1993",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Discrete logarithm problem; Finite
                 Abelian group; Perfect zero-knowledge proof systems;
                 Polynomials; Zero-proof systems",
  publisherinfo = "Service Center Secaucus",
  xxtitle =      "A perfect zero-knowledge proof system for a problem
                 equivalent to the discrete logarithm",
}

@Article{Schrift:1993:UTN,
  author =       "A. W. Schrift and A. Shamir",
  title =        "Universal tests for nonuniform distributions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "3",
  pages =        "119--133",
  month =        "Summer",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "94g:94028",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Weizmann Inst of Science",
  affiliationaddress = "Rehovot, Isr",
  classification = "721.1; 723.2; 922.1; 922.2",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Binary sequences; Cryptography; Independent biased
                 source; Mathematical models; Next bit test; Nonuniform
                 distribution; Random number generation; Randomness;
                 Statistical tests; Universal test",
}

@Article{Rosenbaum:1993:LBA,
  author =       "Ute Rosenbaum",
  title =        "Lower bound on authentication after having observed a
                 sequence of messages",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "3",
  pages =        "135--156",
  month =        "Summer",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "94g:94025",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Siemens AG",
  affiliationaddress = "M{\"u}nchen, Ger",
  classification = "723.2; 922.1",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Authentication systems; Cryptography; Encoding
                 (symbols); Probability; Security of data",
}

@Article{Capocelli:1993:SSS,
  author =       "R. M. Capocelli and A. {De Santis} and L. Gargano and
                 U. Vaccaro",
  title =        "On the size of shares for secret sharing schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "3",
  pages =        "157--167",
  month =        "Summer",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Universita di Roma",
  affiliationaddress = "Roma, Italy",
  classification = "723.2; 921.4; 922.1",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Access structures; Cryptography; Ideal secret sharing
                 schemes; Perfect security; Probability; Secret sharing;
                 Security of data; Set theory",
}

@Article{Coppersmith:1993:MNF,
  author =       "Don Coppersmith",
  title =        "Modifications to the number field sieve",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "3",
  pages =        "169--180",
  month =        "Summer",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "11Y05 (11A51 11Y40 68Q25)",
  MRnumber =     "94h:11111",
  MRreviewer =   "Joe P. Buhler",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Thomas J. Watson Research Cent",
  affiliationaddress = "Yorktown Heights, NY, USA",
  classification = "721.1; 723.1; 723.2; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Algorithms; Computational complexity; Computational
                 methods; Cryptography; Factoring; Modification; Number
                 field sieve; Number theory; Sieve methods; Table
                 lookup",
}

@Article{Orton:1993:DFP,
  author =       "Glenn Orton and Lloyd Peppard and Stafford Tavares",
  title =        "Design of a fast pipelined modular multiplier based on
                 a diminished-radix algorithm",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "4",
  pages =        "183--208",
  month =        "Fall",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Queen's Univ",
  affiliationaddress = "Kingston, Ont, Can",
  classification = "714.2; 722.1; 723.2; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Algorithms; cmos integrated circuits; Computation
                 theory; Computer arithmetic; Cryptography; Design;
                 Encryption; Modular exponentiation; Modular
                 multiplication; Multiplying circuits; Pipelining; VLSI
                 circuits",
}

@Article{Menezes:1993:ECC,
  author =       "Alfred J. Menezes and Scott A. Vanstone",
  title =        "Elliptic curve cryptosystems and their
                 implementation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "4",
  pages =        "209--224",
  month =        "Fall",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "94g:94021",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Waterloo",
  affiliationaddress = "Waterloo, Ont, Can",
  classification = "722.4; 723.2; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Analysis; Computer systems; Cryptography; Elliptic
                 curve cryptosystems; Implementation; Mathematical
                 models; Public key cryptography",
}

@Article{Lenstra:1993:UIK,
  author =       "Arjen K. Lenstra and Yacov Yacobi",
  title =        "User impersonation in key certification schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "6",
  number =       "4",
  pages =        "225--232",
  month =        "Fall",
  year =         "1993",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Bellcore",
  affiliationaddress = "Morristown, NJ, USA",
  classification = "722.4; 723.2; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Certification authority; Cryptography; Key
                 certification; Mathematical models; Mathematical
                 techniques; Public key",
}

@Article{Goldreich:1994:DPZ,
  author =       "Oded Goldreich and Yair Oren",
  title =        "Definitions and Properties of Zero-Knowledge Proof
                 Systems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "1",
  pages =        "1--32",
  month =        "Winter",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68P25 68Q15)",
  MRnumber =     "94m:94016",
  MRreviewer =   "Joan Boyar",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Technion",
  affiliationaddress = "Haifa, Isr",
  classification = "721.1; 722.3; 723.2",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computational complexity; Computational
                 indistinguishability; Cryptographic protocol
                 composition; Cryptography; Formal languages; Network
                 protocols; Terminology; Theorem proving; Zero
                 knowledge",
}

@Article{Klapper:1994:VGS,
  author =       "Andrew Klapper",
  title =        "The Vulnerability of Geometric Sequences Based on
                 Fields of Odd Characteristic",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "1",
  pages =        "33--51",
  month =        "Winter",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "94j:94015",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Manitoba",
  affiliationaddress = "Winnipeg, Manit, Can",
  classification = "721.1; 723.1; 723.2; 921.1; 922.1; 922.2",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Algorithms; Binary sequences; Computational
                 complexity; Cryptanalysis; Cryptography; Data
                 reduction; Galois field; Geometric sequences; Number
                 theory; Partial imbalance; Prime numbers; Probability;
                 Statistical tests",
}

@Article{Chor:1994:SPH,
  author =       "Benny Chor and Mihaly Gereb-Graus and Eyal
                 Kushilevitz",
  title =        "On the Structure of the Privacy Hierarchy",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "1",
  pages =        "53--60",
  month =        "Winter",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "94j:94013",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Technion",
  affiliationaddress = "Haifa, Isr",
  classification = "721.1; 722.4; 723.2",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Cryptography; Distributed computer systems; Function
                 evaluation; Hierarchical systems; Private functions;
                 Private hierarchy; Security of data; Theorem proving",
}

@Article{Murphy:1994:WCG,
  author =       "Sean Murphy and Kenneth Paterson and Peter Wild",
  title =        "A Weak Cipher that Generates the Symmetric Group",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "1",
  pages =        "61--65",
  month =        "Winter",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "94i:94017",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of London",
  affiliationaddress = "Surrey, UK",
  classification = "721.1; 723.2; 921.6; 922.1",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Block cipher; Computational complexity; Cryptography;
                 Function evaluation; Iterative methods; Permutation
                 group; Probability; Security of data",
}

@Article{Simmons:1994:PSI,
  author =       "G. J. Simmons",
  title =        "Proof of soundness (integrity) of cryptographic
                 protocols",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "2",
  pages =        "69--77",
  month =        "Spring",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  classification = "716; 722.3; 723.1.1; 903.3; 921",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Complex systems; Correctness of information;
                 Cryptographic protocols; Cryptography; Formal
                 languages; Information use; Mathematical techniques;
                 Network protocols; Proof of soundness; Protocol
                 failures",
}

@Article{Kemmerer:1994:TSC,
  author =       "R. Kemmerer and C. Meadows and J. Millen",
  title =        "Three systems for cryptographic protocol analysis",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "2",
  pages =        "79--130",
  month =        "Spring",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Nov 21 09:52:57 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California",
  affiliationaddress = "Santa Barbara, CA, USA",
  classification = "716; 722.3; 723.1.1; 723.2; 921.6",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Authentication; Cryptographic protocol analysis;
                 Cryptography; Formal languages; Formal methods;
                 Interrogator; Key distribution; Mathematical
                 techniques; Network protocols; Security of data",
}

@Article{OConnor:1994:ACA,
  author =       "Luke O'Connor",
  title =        "An Analysis of a Class of Algorithms for {$S$}-Box
                 Construction",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "3",
  pages =        "133--151",
  month =        "Summer",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "95e:94040",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Distributed System Technology Cent (DSTC)",
  affiliationaddress = "Brisbane, Aust",
  classification = "721.1; 723.2; 921.1; 921.6",
  conferenceyear = "1994",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Algorithms; Bit by bit methods; Boolean algebra;
                 Conformal mapping; Cryptography; Digital arithmetic;
                 Iterative methods; Mathematical models; Nonlinear
                 equations; Permutations; Product ciphers; S boxes;
                 Table lookup",
  publisherinfo = "Service Center Secaucus",
}

@Article{Teng:1994:FIC,
  author =       "Shang-Hua Teng",
  title =        "Functional Inversion and Communication Complexity",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "3",
  pages =        "153--170",
  month =        "Summer",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68Q25 68Q35)",
  MRnumber =     "95d:94028",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Xerox Corp",
  affiliationaddress = "Palo Alto, CA, USA",
  classification = "721.1; 721.3; 722.3; 723.2; 921.1; 921.6",
  conferenceyear = "1994",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Boolean algebra; Boolean circuits; Communication
                 complexity; Computational complexity; Cryptanalysis;
                 Cryptography; Function evaluation; Functional
                 inversion; Integrated circuit layout; Inverse problems;
                 Logic circuits; Multiparty problems; Network protocols;
                 One way functions; Polynomials; Ring protocol; Theorem
                 proving; Topology; Tree protocol; VLSI circuits",
  publisherinfo = "Service Center Secaucus",
}

@Article{Scheidler:1994:KEP,
  author =       "Renate Scheidler and Johannes A. Buchmann and Hugh C.
                 Williams",
  title =        "A Key-Exchange Protocol Using Real Quadratic Fields",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "3",
  pages =        "171--199",
  month =        "Summer",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "96e:94015",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Delaware",
  affiliationaddress = "Newark, DE, USA",
  classification = "721.1; 722.3; 722.4; 723.2; 921.6",
  conferenceyear = "1994",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Algorithms; Computational complexity; Computational
                 methods; Cryptography; Data communication systems;
                 Discrete logarithm; Integers; Key exchange protocol;
                 Network protocols; Real quadratic fields; Real time
                 systems",
  publisherinfo = "Service Center Secaucus",
}

@Article{Qu:1994:FEA,
  author =       "Ming Hua Qu and S. A. Vanstone",
  title =        "Factorizations in the Elementary {Abelian} $p$-Group
                 and Their Cryptographic Significance",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "4",
  pages =        "201--212",
  month =        "Fall",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (20K01 68P25)",
  MRnumber =     "96b:94011",
  MRreviewer =   "Do Long Van",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{OConnor:1994:ANA,
  author =       "Luke O'Connor and Andrew Klapper",
  title =        "Algebraic Nonlinearity and Its Applications to
                 Cryptography",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "4",
  pages =        "213--227",
  month =        "Fall",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "95h:94024",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Biham:1994:NTC,
  author =       "E. Biham",
  title =        "New Types of Cryptanalytic Attacks Using Related
                 Keys",
  journal =      j-J-CRYPTOLOGY,
  volume =       "7",
  number =       "4",
  pages =        "229--??",
  month =        "Fall",
  year =         "1994",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Davies:1995:PTS,
  author =       "D. Davies and S. Murphy",
  title =        "Pairs and Triplets of {DES} {$S$}-Boxes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "1",
  pages =        "1--??",
  month =        "Winter",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Nyberg:1995:PSA,
  author =       "Kaisa Nyberg and Lars Ramkilde Knudsen",
  title =        "Provable Security Against a Differential Attack",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "1",
  pages =        "27--37",
  month =        "Winter",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "95m:94007",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Blundo:1995:GDS,
  author =       "C. Blundo and A. {De Santis} and D. R. Stinson and U.
                 Vaccaro",
  title =        "Graph Decompositions and Secret Sharing Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "1",
  pages =        "39--64",
  month =        "Winter",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "96a:94011",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{OConnor:1995:DCB,
  author =       "L. O'Connor",
  title =        "On the Distribution of Characteristics in Bijective
                 Mappings",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "2",
  pages =        "67--??",
  month =        "Spring",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Russell:1995:NSC,
  author =       "Alexander Russell",
  title =        "Necessary and Sufficient Conditions for Collision-Free
                 Hashing",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "2",
  pages =        "87--99",
  month =        "Spring",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68Q20)",
  MRnumber =     "95m:94008",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Vanstone:1995:SRK,
  author =       "S. A. Vanstone and R. J. Zuccherato",
  title =        "Short {RSA} Keys and Their Generation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "2",
  pages =        "101--??",
  month =        "Spring",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Yang:1995:FEB,
  author =       "Yi Xian Yang and Bao An Guo",
  title =        "Further Enumerating {Boolean} Functions of
                 Cryptographic Parameters",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "3",
  pages =        "115--122",
  month =        "Summer",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 346 018",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  xxtitle =      "Further enumerating {Boolean} functions of
                 cryptographic significance",
}

@Article{Maurer:1995:FGP,
  author =       "Ueli M. Maurer",
  title =        "Fast Generation of Prime Numbers and Secure Public-Key
                 Cryptographic Parameters",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "3",
  pages =        "123--155",
  month =        "Summer",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "96i:94021",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Blackburn:1995:CPK,
  author =       "Simon Blackburn and Sean Murphy and Jacques Stern",
  title =        "The Cryptanalysis of a Public-Key Implementation of
                 Finite Group Mappings",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "3",
  pages =        "157--166",
  month =        "Summer",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "96k:94008",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Stinson:1995:ICC,
  author =       "D. R. Stinson and J. L. Massey",
  title =        "An Infinite Class of Counterexamples to a Conjecture
                 Concerning Nonlinear Resilient Functions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "3",
  pages =        "167--173",
  month =        "Summer",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "96g:94015",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Pei:1995:ITB,
  author =       "Ding Yi Pei",
  title =        "Information-Theoretic Bounds for Authentication Codes
                 and Block Designs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "4",
  pages =        "177--188",
  month =        "Fall",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "96f:94013",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Dyer:1995:KSS,
  author =       "Martin Dyer and Trevor Fenner and Alan Frieze and
                 Andrew Thomason",
  title =        "On Key Storage in Secure Networks",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "4",
  pages =        "189--??",
  month =        "Fall",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Damgaard:1995:PPS,
  author =       "I. B. Damg{\aa}rd",
  title =        "Practical and Provably Secure Release of a Secret and
                 Exchange of Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "8",
  number =       "4",
  pages =        "201--??",
  month =        "Fall",
  year =         "1995",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Heys:1996:SPN,
  author =       "Howard M. Heys and Stafford E. Tavares",
  title =        "Substitution-Permutation Networks Resistant to
                 Differential and Linear Cryptanalysis",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "1",
  pages =        "1--19",
  month =        "Winter",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "96k:94010",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n1p1.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n1p1.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n1p1.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00901.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Ben-Aroya:1996:DCL,
  author =       "Ishai Ben-Aroya and Eli Biham",
  title =        "Differential Cryptanalysis of {Lucifer}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "1",
  pages =        "21--34",
  month =        "Winter",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n1p21.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n1p21.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n1p21.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00901.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Even:1996:LLD,
  author =       "Shimon Even and Oded Goldreich and Silvio Micali",
  title =        "On-Line\slash Off-Line Digital Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "1",
  pages =        "35--67",
  month =        "Winter",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 381 075",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n1p35.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n1p35.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n1p35.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00901.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fischer:1996:BSK,
  author =       "Michael J. Fischer and Rebecca N. Wright",
  title =        "Bounds on Secret Key Exchange Using a Random Deal of
                 Cards",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "2",
  pages =        "71--99",
  month =        "Spring",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "97b:94021",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n2p71.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n2p71.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n2p71.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00902.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Itoh:1996:LCC,
  author =       "Toshiya Itoh and Masafumi Hoshi and Shigeo Tsujii",
  title =        "A Low Communication Competitive Interactive Proof
                 System for Promised Quadratic Residuosity",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "2",
  pages =        "101--109",
  month =        "Spring",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "96k:94011",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n2p101.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n2p101.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n2p101.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00902.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Golic:1996:CPG,
  author =       "Jovan Dj. Golic",
  title =        "Correlation Properties of a General Binary Combiner
                 with Memory",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "2",
  pages =        "111--126",
  month =        "Spring",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n2p111.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n2p111.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n2p111.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00902.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Crepeau:1996:GEI,
  author =       "Claude Cr{\'e}peau",
  title =        "{Guest Editor}'s Introduction",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "3",
  pages =        "127--128",
  month =        "Summer",
  year =         "1996",
  bibdate =      "Sat Nov 21 09:26:08 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n3p127.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p127.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p127.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00902.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{DeSantis:1996:PPZ,
  author =       "Alfredo {De Santis} and Giuseppe Persiano",
  title =        "The Power of Preprocessing in Zero-Knowledge Proofs of
                 Knowledge",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "3",
  pages =        "129--148",
  month =        "Summer",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "97f:94007",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n3p129.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p129.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p129.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00903.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bellare:1996:CPN,
  author =       "Mihir Bellare and Moti Yung",
  title =        "Certifying Permutations: Noninteractive Zero-Knowledge
                 Based on Any Trapdoor Permutation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "3",
  pages =        "149--166",
  month =        "Summer",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "97f:94005",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n3p149.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p149.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p149.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00903.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Goldreich:1996:HCC,
  author =       "Oded Goldreich and Ariel Kahan",
  title =        "How To Construct Constant-Round Zero-Knowledge Proof
                 Systems for {NP}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "3",
  pages =        "167--189",
  month =        "Summer",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "97f:94008",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n3p167.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p167.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p167.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00903.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fischer:1996:SPO,
  author =       "M. J. Fischer and S. Micali and C. Rackoff",
  title =        "A Secure Protocol for the Oblivious Transfer (Extended
                 Abstract)",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "3",
  pages =        "191--195",
  month =        "Summer",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 403 497",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n3p191.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p191.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n3p191.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00903.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Impagliazzo:1996:ECS,
  author =       "Russell Impagliazzo and Moni Naor",
  title =        "Efficient Cryptographic Schemes Provably as Secure as
                 Subset Sum",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "4",
  pages =        "199--216",
  month =        "Fall",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (65C10)",
  MRnumber =     "97k:94030",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n4p199.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n4p199.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n4p199.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00904.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Franklin:1996:JEM,
  author =       "Matthew Franklin and Stuart Haber",
  title =        "Joint Encryption and Message-Efficient Secure
                 Computation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "4",
  pages =        "217--232",
  month =        "Fall",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "97h:94010",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n4p217.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n4p217.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n4p217.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00904.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Jackson:1996:ISS,
  author =       "Wen-Ai Jackson and Keith M. Martin and Christine M.
                 O'Keefe",
  title =        "Ideal Secret Sharing Schemes with Multiple Secrets",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "4",
  pages =        "233--250",
  month =        "Fall",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "98e:94019",
  MRreviewer =   "Ugo Vaccaro",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n4p233.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n4p233.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n4p233.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00904.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Han:1996:PGF,
  author =       "Yenjo Han and Lane A. Hemaspaandra",
  title =        "Pseudorandom Generators and the Frequency of
                 Simplicity",
  journal =      j-J-CRYPTOLOGY,
  volume =       "9",
  number =       "4",
  pages =        "251--261",
  month =        "Fall",
  year =         "1996",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (65C10)",
  MRnumber =     "98a:94021",
  MRreviewer =   "Robert M. Baer",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/9n4p251.html;
                 http://link.springer.de/link/service/journals/00145/bibs/9n4p251.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/9n4p251.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/00904.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{deRooij:1997:SPD,
  author =       "Peter {de Rooij}",
  title =        "On {Schnorr}'s Preprocessing for Digital Signature
                 Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "1",
  pages =        "1--16",
  month =        "Winter",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n1p1.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p1.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p1.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01001.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Beaver:1997:LRR,
  author =       "D. Beaver and J. Feigenbaum and J. Kilian and P.
                 Rogaway",
  title =        "Locally Random Reductions: Improvements and
                 Applications",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "1",
  pages =        "17--36",
  month =        "Winter",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68Q15)",
  MRnumber =     "98g:94022",
  MRreviewer =   "Claus-Peter Schnorr",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n1p17.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p17.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p17.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01001.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Itoh:1997:LDC,
  author =       "Toshiya Itoh and Yuji Ohta and Hiroki Shizuya",
  title =        "A Language-Dependent Cryptographic Primitive",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "1",
  pages =        "37--49",
  month =        "Winter",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "98m:94037",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n1p37.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p37.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p37.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01001.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Dobbertin:1997:RTC,
  author =       "H. Dobbertin",
  title =        "{RIPEMD} with Two-Round Compress Function Is Not
                 Collision-Free",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "1",
  pages =        "51--69",
  month =        "Winter",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n1p51.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p51.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p51.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01001.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kaliski:1997:CMA,
  author =       "B. S. Kaliski",
  title =        "A Chosen Message Attack on {Demytko}'s Elliptic Curve
                 Cryptosystem",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "1",
  pages =        "71--72",
  month =        "Winter",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n1p71.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p71.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n1p71.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01001.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fiat:1997:BR,
  author =       "A. Fiat",
  title =        "Batch {RSA}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "2",
  pages =        "75--88",
  month =        "Spring",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n2p75.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n2p75.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n2p75.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01002.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Yacobi:1997:BDK,
  author =       "Y. Yacobi and M. J. Beller",
  title =        "Batch {Diffie--Hellman} Key Agreement Systems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "2",
  pages =        "89--96",
  month =        "Spring",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n2p89.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n2p89.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n2p89.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01002.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Cachin:1997:LIR,
  author =       "C. Cachin and U. M. Maurer",
  title =        "Linking Information Reconciliation and Privacy
                 Amplification",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "2",
  pages =        "97--110",
  month =        "Spring",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n2p97.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n2p97.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n2p97.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01002.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Klapper:1997:FSR,
  author =       "Andrew Klapper and Mark Goresky",
  title =        "Feedback Shift Registers, {$2$}-Adic Span, and
                 Combiners with Memory",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "2",
  pages =        "111--147",
  month =        "Spring",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A55 (94A60)",
  MRnumber =     "98f:94012",
  MRreviewer =   "Shojiro Sakata",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n2p111.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n2p111.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n2p111.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01002.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Even:1997:CCS,
  author =       "Shimon Even and Yishay Mansour",
  title =        "A Construction of a Cipher from a Single Pseudorandom
                 Permutation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "3",
  pages =        "151--161",
  month =        "Summer",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "98j:94019",
  MRreviewer =   "Mu Lan Liu",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n3p151.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n3p151.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n3p151.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Damgaard:1997:ESH,
  author =       "Ivan B. Damg{\aa}rd and Torben P. Pedersen and Birgit
                 Pfitzmann",
  title =        "On the Existence of Statistically Hiding Bit
                 Commitment Schemes and Fail-Stop Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "3",
  pages =        "163--194",
  month =        "Summer",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "98e:94016",
  MRreviewer =   "Luis Hern{\'a}ndez Encinas",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n3p163.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n3p163.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n3p163.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Biham:1997:IDA,
  author =       "Eli Biham and Alex Biryukov",
  title =        "An Improvement of {Davies}' Attack on {DES}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "3",
  pages =        "195--205",
  month =        "Summer",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n3p195.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n3p195.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n3p195.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Coppersmith:1997:SBP,
  author =       "Don Coppersmith and Jacques Stern and Serge Vaudenay",
  title =        "The Security of the Birational Permutation Signature
                 Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "3",
  pages =        "207--221",
  month =        "Summer",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94Axx (13Pxx)",
  MRnumber =     "1 456 328",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n3p207.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n3p207.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n3p207.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Csirmaz:1997:SSM,
  author =       "L{\'a}szl{\'o} Csirmaz",
  title =        "The Size of a Share Must Be Large",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "4",
  pages =        "223--231",
  month =        "Fall",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "98k:94008",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n4p223.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n4p223.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n4p223.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01004.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Coppersmith:1997:SSP,
  author =       "Don Coppersmith",
  title =        "Small Solutions to Polynomial Equations, and Low
                 Exponent {RSA} Vulnerabilities",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "4",
  pages =        "233--260",
  month =        "Fall",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (11Y05)",
  MRnumber =     "1 476 612",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n4p233.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n4p233.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n4p233.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01004.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Jackson:1997:MTA,
  author =       "Wen-Ai Jackson and Keith M. Martin and Christine M.
                 O'Keefe",
  title =        "Mutually Trusted Authority-Free Secret Sharing
                 Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "10",
  number =       "4",
  pages =        "261--289",
  month =        "Fall",
  year =         "1997",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "98m:94038",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/10n4p261.html;
                 http://link.springer.de/link/service/journals/00145/bibs/10n4p261.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/10n4p261.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01004.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kilian:1998:ENZ,
  author =       "Joe Kilian and Erez Petrank",
  title =        "An Efficient Noninteractive Zero-Knowledge Proof
                 System for {NP} with General Assumptions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "1",
  pages =        "1--27",
  month =        "Winter",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 609 465",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n1p1.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n1p1.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n1p1.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01101.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Sakurai:1998:SCC,
  author =       "Kouichi Sakurai and Hiroki Shizuya",
  title =        "A Structural Comparison of the Computational
                 Difficulty of Breaking Discrete Log Cryptosystems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "1",
  pages =        "29--43",
  month =        "Winter",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 609 469",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n1p29.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n1p29.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n1p29.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01101.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Biham:1998:CMM,
  author =       "Eli Biham",
  title =        "Cryptanalysis of Multiple Modes of Operation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "1",
  pages =        "45--58",
  month =        "Winter",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 609 473",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n1p45.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n1p45.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n1p45.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01101.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Knudsen:1998:AFD,
  author =       "Lars R. Knudsen and Xuejia Lai and Bart Preneel",
  title =        "Attacks on Fast Double Block Length Hash Functions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "1",
  pages =        "59--72",
  month =        "Winter",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 609 477",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n1p59.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n1p59.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n1p59.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01101.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Golic:1998:MCI,
  author =       "Jovan Dj. Goli{\'c}",
  title =        "On Matroid Characterization of Ideal Secret Sharing
                 Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "2",
  pages =        "75--86",
  month =        "Spring",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "98m:94035",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n2p75.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p75.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p75.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01102.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Naor:1998:PZK,
  author =       "Moni Naor and Rafail Ostrovsky and Ramarathnam
                 Venkatesan and Moti Yung",
  title =        "Perfect Zero-Knowledge Arguments for {NP} Using Any
                 One-Way Permutation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "2",
  pages =        "87--108",
  month =        "Spring",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68Q15)",
  MRnumber =     "1 620 948",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n2p87.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p87.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p87.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01102.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Scheidler:1998:PKC,
  author =       "R. Scheidler",
  title =        "A Public-Key Cryptosystem Using Purely Cubic Fields",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "2",
  pages =        "109--124",
  month =        "Spring",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (11R16 11Txx)",
  MRnumber =     "1 620 944",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n2p109.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p109.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p109.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01102.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Schnorr:1998:BBM,
  author =       "Claus Peter Schnorr and Serge Vaudenay",
  title =        "The Black-Box Model for Cryptographic Primitives",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "2",
  pages =        "125--140",
  month =        "Spring",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 620 940",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n2p125.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p125.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p125.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01102.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Balasubramanian:1998:IEC,
  author =       "R. Balasubramanian and Neal Koblitz",
  title =        "The Improbability That an Elliptic Curve Has
                 Subexponential Discrete Log Problem under the
                 {Menezes-Okamoto-Vanstone} Algorithm",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "2",
  pages =        "141--145",
  month =        "Spring",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (11Gxx)",
  MRnumber =     "1 620 936",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n2p141.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p141.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n2p141.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01102.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Brandt:1998:ZKA,
  author =       "J{\o}rgen Brandt and Ivan Damg{\aa}rd and Peter
                 Landrock and Torben Pedersen",
  title =        "Zero-Knowledge Authentication Scheme with Secret Key
                 Exchange",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "3",
  pages =        "147--159",
  month =        "Summer",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 633 940",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n3p147.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n3p147.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n3p147.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01103.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Joux:1998:LRT,
  author =       "Antoine Joux and Jacques Stern",
  title =        "Lattice Reduction: {A} Toolbox for the Cryptanalyst",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "3",
  pages =        "161--185",
  month =        "Summer",
  year =         "1998",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s001459900042",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 633 944",
  bibdate =      "Wed Aug 11 14:51:51 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n3p161.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n3p161.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n3p161.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01103.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Dwork:1998:EEU,
  author =       "Cynthia Dwork and Moni Naor",
  title =        "An Efficient Existentially Unforgeable Signature
                 Scheme and Its Applications",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "3",
  pages =        "187--208",
  month =        "Summer",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 633 948",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n3p187.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n3p187.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n3p187.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01103.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Damgaard:1998:TKT,
  author =       "Ivan B. Damg{\aa}rd and Lars R. Knudsen",
  title =        "Two-Key Triple Encryption",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "3",
  pages =        "209--218",
  month =        "Summer",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 633 952",
  bibdate =      "Sat Nov 21 16:36:38 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n3p209.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n3p209.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n3p209.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01103.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Muller:1998:FME,
  author =       "Volker M{\"u}ller",
  title =        "Fast Multiplication on Elliptic Curves over Small
                 Fields of Characteristic Two",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "4",
  pages =        "219--234",
  month =        "Fall",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n4p219.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n4p219.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n4p219.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01104.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Murphy:1998:AS,
  author =       "Sean Murphy",
  title =        "An Analysis of {SAFER}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "4",
  pages =        "235--251",
  month =        "Fall",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n4p235.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n4p235.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n4p235.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01104.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Dobbertin:1998:CM,
  author =       "Hans Dobbertin",
  title =        "Cryptanalysis of {MD4}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "4",
  pages =        "253--271",
  month =        "Fall",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n4p253.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n4p253.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n4p253.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01104.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Rogaway:1998:SOE,
  author =       "Phillip Rogaway and Don Coppersmith",
  title =        "A Software-Optimized Encryption Algorithm",
  journal =      j-J-CRYPTOLOGY,
  volume =       "11",
  number =       "4",
  pages =        "273--287",
  month =        "Fall",
  year =         "1998",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Nov 20 16:50:07 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/11n4p273.html;
                 http://link.springer.de/link/service/journals/00145/bibs/11n4p273.pdf;
                 http://link.springer.de/link/service/journals/00145/bibs/11n4p273.tex;
                 http://link.springer.de/link/service/journals/00145/tocs/01104.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{vanOorschot:1999:PCS,
  author =       "Paul C. {van Oorschot} and Michael J. Wiener",
  title =        "Parallel Collision Search with Cryptanalytic
                 Applications",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "1",
  pages =        "1--28",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri May 21 15:25:04 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n1p1.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n1p1.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n1p1.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Naor:1999:CPP,
  author =       "Moni Naor and Omer Reingold",
  title =        "On the Construction of Pseudorandom Permutations:
                 {Luby-Rackoff} Revisited",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "1",
  pages =        "29--66",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri May 21 15:25:04 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n1p29.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n1p29.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n1p29.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Smart:1999:FDH,
  author =       "N. P. Smart and S. Siksek",
  title =        "A Fast {Diffie--Hellman} Protocol in Genus 2",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "1",
  pages =        "67--73",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri May 21 15:25:04 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n1p67.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n1p67.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n1p67.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Halevi:1999:ECS,
  author =       "Shai Halevi",
  title =        "Efficient Commitment Schemes with Bounded Sender and
                 Unbounded Receiver",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "2",
  pages =        "77--89",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri May 21 15:25:04 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n2p77.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n2p77.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n2p77.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Rogaway:1999:BHA,
  author =       "Phillip Rogaway",
  title =        "Bucket Hashing and Its Application to Fast Message
                 Authentication",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "2",
  pages =        "91--115",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri May 21 15:25:04 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n2p91.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n2p91.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n2p91.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bellare:1999:TCA,
  author =       "Mihir Bellare and Ronald L. Rivest",
  title =        "Translucent Cryptography --- An Alternative to Key
                 Escrow, and Its Implementation via Fractional Oblivious
                 Transfer",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "2",
  pages =        "117--139",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri May 21 15:25:04 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n2p117.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n2p117.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n2p117.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Smart:1999:ECC,
  author =       "N. P. Smart",
  title =        "Elliptic Curve Cryptosystems over Small Fields of Odd
                 Characteristic",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "2",
  pages =        "141--151",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri May 21 15:25:04 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n2p141.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n2p141.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n2p141.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Blundo:1999:FBA,
  author =       "Carlo Blundo and Alfredo {De Santis} and Kaoru
                 Kurosawa and Wakaha Ogata",
  title =        "On a Fallacious Bound for Authentication Codes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "3",
  pages =        "155--159",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Jul 03 17:04:28 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n3p155.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n3p155.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Biham:1999:CTM,
  author =       "Eli Biham",
  title =        "Cryptanalysis of Triple Modes of Operation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "3",
  pages =        "161--184",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Jul 03 17:04:28 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n3p161.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n3p161.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bernstein:1999:HSR,
  author =       "Daniel J. Bernstein",
  title =        "How to Stretch Random Functions: The Security of
                 Protected Counter Sums",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "3",
  pages =        "185--192",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Jul 03 17:04:28 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n3p185.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n3p185.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Smart:1999:DLP,
  author =       "N. P. Smart",
  title =        "The Discrete Logarithm Problem on Elliptic Curves of
                 Trace One",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "3",
  pages =        "193--196",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Jul 03 17:04:28 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n3p193.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n3p193.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Burmester:1999:DSF,
  author =       "Mike Burmester and Yvo G. Desmedt and Toshiya Itoh and
                 Kouichi Sakurai and Hiroki Shizuya",
  title =        "Divertible and Subliminal-Free Zero-Knowledge Proofs
                 for Languages",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "3",
  pages =        "197--223",
  month =        "",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Jul 03 17:04:28 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n3p197.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n3p197.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Quinn:1999:BKD,
  author =       "Kathleen A. S. Quinn",
  title =        "Bounds for Key Distribution Patterns",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "4",
  pages =        "227--239",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/01204.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n4p227.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n4p227.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n4p227.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Joye:1999:CRB,
  author =       "Marc Joye and Arjen K. Lenstra and Jean-Jacques
                 Quisquater",
  title =        "{Chinese} Remaindering Based Cryptosystems in the
                 Presence of Faults",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "4",
  pages =        "241--245",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/01204.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n4p241.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n4p241.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n4p241.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Shoup:1999:SPI,
  author =       "Victor Shoup",
  title =        "On the Security of a Practical Identification Scheme",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "4",
  pages =        "247--260",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/01204.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n4p247.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n4p247.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n4p247.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Blundo:1999:CVC,
  author =       "Carlo Blundo and Alfredo {De Santis} and Douglas R.
                 Stinson",
  title =        "On the Contrast in Visual Cryptography Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "12",
  number =       "4",
  pages =        "261--289",
  year =         "1999",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/01204.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/12n4p261.html;
                 http://link.springer.de/link/service/journals/00145/papers/12n4p261.pdf;
                 http://link.springer.de/link/service/journals/00145/papers/12n4p261.tex",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Goldreich:2000:P,
  author =       "Oded Goldreich",
  title =        "Preface",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "1",
  pages =        "1--7",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130001.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013001/00130001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Franklin:2000:SCM,
  author =       "Matthew Franklin and Rebecca N. Wright",
  title =        "Secure Communication in Minimal Connectivity Models",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "1",
  pages =        "9--30",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130009.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013001/00130009.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hirt:2000:PSG,
  author =       "Martin Hirt and Ueli Maurer",
  title =        "Player Simulation and General Adversary Structures in
                 Perfect Multiparty Computation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "1",
  pages =        "31--60",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130031.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013001/00130031.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Canetti:2000:MAC,
  author =       "Ran Canetti and Shai Halevi and Amir Herzberg",
  title =        "Maintaining Authenticated Communication in the
                 Presence of Break-Ins",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "1",
  pages =        "61--105",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130061.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013001/00130061.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Canetti:2000:RVF,
  author =       "Ran Canetti and Eyal Kushilevitz and Rafail Ostrovsky
                 and Adi Ros{\'e}n",
  title =        "Randomness versus Fault-Tolerance",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "1",
  pages =        "107--142",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130107.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013001/00130107.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Canetti:2000:SCM,
  author =       "Ran Canetti",
  title =        "Security and Composition of Multiparty Cryptographic
                 Protocols",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "1",
  pages =        "143--202",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130143.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013001/00130143.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Zbinden:2000:PAQ,
  author =       "H. Zbinden and N. Gisin and B. Huttner and A. Muller
                 and W. Tittel",
  title =        "Practical Aspects of Quantum Cryptographic Key
                 Distribution",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "2",
  pages =        "207--220",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130207.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013002/00130207.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fischlin:2000:SSP,
  author =       "R. Fischlin and C. P. Schnorr",
  title =        "Stronger Security Proofs for {RSA} and {Rabin} Bits",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "2",
  pages =        "221--244",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130221.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013002/00130221.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Golic:2000:FCA,
  author =       "Jovan Dj. Golic and Mahmoud Salmasizadeh and Ed
                 Dawson",
  title =        "Fast Correlation Attacks on the Summation Generator",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "2",
  pages =        "245--262",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130245.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013002/00130245.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Paulus:2000:NPK,
  author =       "Sachar Paulus and Tsuyoshi Takagi",
  title =        "A New Public-Key Cryptosystem over a Quadratic Order
                 with Quadratic Decryption Time",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "2",
  pages =        "263--272",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "2000k:94037",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130263.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013002/00130263.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology. The Journal of the
                 International Association for Cryptologic Research",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Gennaro:2000:RES,
  author =       "Rosario Gennaro and Tal Rabin and Stanislav Jarecki
                 and Hugo Krawczyk",
  title =        "Robust and Efficient Sharing of {RSA} Functions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "2",
  pages =        "273--300",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/bibs/0013002/00130273.html;
                 http://link.springer.de/link/service/journals/00145/papers/0013002/00130273.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Zhang:2000:MCA,
  author =       "Muxiang Zhang",
  title =        "Maximum Correlation Analysis of Nonlinear Combining
                 Functions in Stream Ciphers",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "3",
  pages =        "301--314",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10007/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10007/paper/10007.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Petrank:2000:CMR,
  author =       "Erez Petrank and Charles Rackoff",
  title =        "{CBC MAC} for Real-Time Data Sources",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "3",
  pages =        "315--338",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10009/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10009/paper/10009.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Coppersmith:2000:PAD,
  author =       "Don Coppersmith and Igor Shparlinski",
  title =        "On Polynomial Approximation of the Discrete Logarithm
                 and the {Diffie--Hellman} Mapping",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "3",
  pages =        "339--360",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10002/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10002/paper/10002.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Pointcheval:2000:SAD,
  author =       "David Pointcheval and Jacques Stern",
  title =        "Security Arguments for Digital Signatures and Blind
                 Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "3",
  pages =        "361--396",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 9 17:48:14 MDT 2000",
  bibsource =    "http://link.springer.de/link/service/journals/00145/tocs/t0013003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10003/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10003/paper/10003.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Gennaro:2000:RBU,
  author =       "Rosario Gennaro and Tal Rabin and Hugo Krawczyk",
  title =        "{RSA}-Based Undeniable Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "4",
  pages =        "397--416",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Nov 13 16:25:51 MST 2000",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10001/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10001/paper/10001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Knudsen:2000:DAS,
  author =       "Lars R. Knudsen",
  title =        "A Detailed Analysis of {SAFER} {K}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "4",
  pages =        "417--436",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Nov 13 16:25:51 MST 2000",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10004/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10004/paper/10004.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Pollard:2000:KMD,
  author =       "J. M. Pollard",
  title =        "Kangaroos, {Monopoly} and Discrete Logarithms",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "4",
  pages =        "437--447",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Nov 13 16:25:51 MST 2000",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10010/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10010/paper/10010.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Boyar:2000:SNI,
  author =       "Joan Boyar and Ivan Damg{\aa}rd and Ren{\'e} Peralta",
  title =        "Short Non-Interactive Cryptographic Proofs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "4",
  pages =        "449--472",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Nov 13 16:25:51 MST 2000",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10011/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10011/paper/10011.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Jacobson:2000:CDL,
  author =       "Michael J. {Jacobson, Jr.}",
  title =        "Computing Discrete Logarithms in Quadratic Orders",
  journal =      j-J-CRYPTOLOGY,
  volume =       "13",
  number =       "4",
  pages =        "473--492",
  year =         "2000",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Nov 13 16:25:51 MST 2000",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t0013004.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10013/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10013/paper/10013.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Klapper:2001:ESK,
  author =       "Andrew Klapper",
  title =        "On the Existence of Secure Keystream Generators",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "1",
  pages =        "1--15",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10014/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10014/paper/10014.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kilian:2001:HPA,
  author =       "Joe Kilian and Phillip Rogaway",
  title =        "How to Protect {DES} Against Exhaustive Key Search (an
                 Analysis of {DESX})",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "1",
  pages =        "17--35",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10015/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10015/paper/10015.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{DiCrescenzo:2001:USP,
  author =       "Giovanni {Di Crescenzo} and Yuval Ishai and Rafail
                 Ostrovsky",
  title =        "Universal Service-Providers for Private Information
                 Retrieval",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "1",
  pages =        "37--74",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10008/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10008/paper/10008.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Coppersmith:2001:WQS,
  author =       "Don Coppersmith",
  title =        "Weakness in Quaternion Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "2",
  pages =        "77--85",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10006/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10006/paper/10006.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Vaudenay:2001:CCR,
  author =       "Serge Vaudenay",
  title =        "Cryptanalysis of the {Chor--Rivest} Cryptosystem",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "2",
  pages =        "87--100",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "2002e:94103",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10005/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10005/paper/10005.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Boneh:2001:IEE,
  author =       "Dan Boneh and Richard A. DeMillo and Richard J.
                 Lipton",
  title =        "On the Importance of Eliminating Errors in
                 Cryptographic Computations",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "2",
  pages =        "101--119",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10016/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10016/paper/10016.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Wang:2001:SCM,
  author =       "Yongge Wang and Yvo Desmedt",
  title =        "Secure Communication in Multicast Channels: The Answer
                 to {Franklin} and {Wright}'s Question",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "2",
  pages =        "121--135",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0002/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0002/paper/0002.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Ye:2001:DAA,
  author =       "Dingfeng Ye and Zongduo Dai and Kwok-Yan Lam",
  title =        "Decomposing Attacks on Asymmetric Cryptography Based
                 on Mapping Compositions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "2",
  pages =        "137--150",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0001/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0001/paper/0001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bailey:2001:EAF,
  author =       "Daniel V. Bailey and Christof Paar",
  title =        "Efficient Arithmetic in Finite Field Extensions with
                 Application in Elliptic Curve Cryptography",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "3",
  pages =        "153--176",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/00/10012/;
                 http://link.springer.de/link/service/journals/00145/contents/00/10012/paper/10012.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Goldmann:2001:CBG,
  author =       "Mikael Goldmann and Mats N{\"a}slund and Alexander
                 Russell",
  title =        "Complexity Bounds on General Hard-Core Predicates",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "3",
  pages =        "177--195",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0007/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0007/paper/0007.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Jakobsen:2001:ABC,
  author =       "Thomas Jakobsen and Lars R. Knudsen",
  title =        "Attacks on Block Ciphers of Low Algebraic Degree",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "3",
  pages =        "197--210",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0003/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0003/paper/0003.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fiat:2001:DTT,
  author =       "Amos Fiat and Tamir Tassa",
  title =        "Dynamic Traitor Tracing",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "3",
  pages =        "211--223",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 18 07:11:09 MDT 2001",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0006/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0006/paper/0006.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Scanlon:2001:PKC,
  author =       "Thomas Scanlon",
  title =        "Public Key Cryptosystems Based on {Drinfeld} Modules
                 Are Insecure",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "4",
  pages =        "225--230",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Feb 23 09:02:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014004.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0004/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0004/paper/0004.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kurosawa:2001:AWI,
  author =       "Kaoru Kurosawa and Thomas Johansson and Douglas R.
                 Stinson",
  title =        "Almost $k$-Wise Independent Sample Spaces and Their
                 Cryptologic Applications",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "4",
  pages =        "231--253",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Feb 23 09:02:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014004.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0010/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0010/paper/0010.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lenstra:2001:SCK,
  author =       "Arjen K. Lenstra and Eric R. Verheul",
  title =        "Selecting Cryptographic Key Sizes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "14",
  number =       "4",
  pages =        "255--293",
  year =         "2001",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Feb 23 09:02:29 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t1014004.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0009/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0009/paper/0009.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Micali:2002:IES,
  author =       "Silvio Micali and Leonid Reyzin",
  title =        "Improving the Exact Security of Digital Signature
                 Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "1",
  pages =        "1--18",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Feb 23 09:05:18 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0005/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0005/paper/0005.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Gaudry:2002:CDF,
  author =       "P. Gaudry and F. Hess and N. P. Smart",
  title =        "Constructive and Destructive Facets of {Weil} Descent
                 on Elliptic Curves",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "1",
  pages =        "19--46",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Feb 23 09:05:18 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0011/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0011/paper/0011.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Biham:2002:CAX,
  author =       "Eli Biham and Lars R. Knudsen",
  title =        "Cryptanalysis of the {ANSI X9.52 CBCM} Mode",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "1",
  pages =        "47--59",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60",
  MRnumber =     "1 880 934",
  bibdate =      "Sat Feb 23 09:05:18 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0016/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0016/paper/0016.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Moldovyan:2002:CBD,
  author =       "A. A. Moldovyan and N. A. Moldovyan",
  title =        "A Cipher Based on Data-Dependent Permutations",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "1",
  pages =        "61--72",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Feb 23 09:05:18 MST 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015001.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0012/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0012/paper/0012.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Shoup:2002:STC,
  author =       "Victor Shoup and Rosario Gennaro",
  title =        "Securing Threshold Cryptosystems against Chosen
                 Ciphertext Attack",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "2",
  pages =        "75--96",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 20 14:17:21 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0020/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0020/paper/0020.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Naor:2002:CPR,
  author =       "Moni Naor and Omer Reingold",
  title =        "Constructing Pseudo-Random Permutations with a
                 Prescribed Structure",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "2",
  pages =        "97--102",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 20 14:17:21 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0008/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0008/paper/0008.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Abadi:2002:RTV,
  author =       "Mart{\'\i}n Abadi and Phillip Rogaway",
  title =        "Reconciling Two Views of Cryptography (The
                 Computational Soundness of Formal Encryption)",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "2",
  pages =        "103--127",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (68Qxx)",
  MRnumber =     "1 903 446",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
                 MathSciNet database",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0014/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0014/paper/0014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology. The Journal of the
                 International Association for Cryptologic Research",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Galbraith:2002:ECP,
  author =       "Steven D. Galbraith",
  title =        "Elliptic Curve {Paillier} Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "2",
  pages =        "129--138",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 20 14:17:21 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0015/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0015/paper/0015.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Johnston:2002:AKE,
  author =       "Anna M. Johnston and Peter S. Gemmell",
  title =        "Authenticated Key Exchange Provably Secure Against the
                 Man-in-the-Middle Attack",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "2",
  pages =        "139--148",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 20 14:17:21 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015002.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0017/;
                 http://link.springer.de/link/service/journals/00145/contents/01/0017/paper/0017.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Nguyen:2002:IDS,
  author =       "Phong Q. Nguyen and Igor E. Shparlinski",
  title =        "The Insecurity of the {Digital Signature Algorithm}
                 with Partially Known Nonces",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "3",
  pages =        "151--176",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 16 07:13:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/02/0021/index.html;
                 http://link.springer.de/link/service/journals/00145/contents/02/0021/paper/s00145-002-0021-3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lindell:2002:PPD,
  author =       "Yehuda Lindell and Benny Pinkas",
  title =        "Privacy Preserving Data Mining",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "3",
  pages =        "177--206",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 16 07:13:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/01/0019/index.html;
                 http://link.springer.de/link/service/journals/00145/contents/01/0019/paper/s00145-001-0019-2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Knudsen:2002:SFC,
  author =       "Lars R. Knudsen",
  title =        "The Security of {Feistel} Ciphers with Six Rounds or
                 Less",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "3",
  pages =        "207--222",
  year =         "2002",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 16 07:13:07 MDT 2002",
  bibsource =    "http://link.springer-ny.com/link/service/journals/00145/tocs/t2015003.html;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.de/link/service/journals/00145/contents/02/9839/index.html;
                 http://link.springer.de/link/service/journals/00145/contents/02/9839/paper/s00145-002-9839-y.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Shoup:2002:OR,
  author =       "Victor Shoup",
  title =        "{OAEP} Reconsidered",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "4",
  pages =        "223--249",
  month =        sep,
  year =         "2002",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0133-9",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:13 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Bellare and Rogaway; Chosen ciphertext security,
                 Random oracle model; OAEP encryption scheme; Public-key
                 encryption",
}

@Article{Catalano:2002:PTF,
  author =       "Dario Catalano and Rosario Gennaro and Nick
                 Howgrave-Graham",
  title =        "{Paillier}'s Trapdoor Function Hides up to {$O(n)$}
                 Bits",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "4",
  pages =        "251--269",
  month =        sep,
  year =         "2002",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0112-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:13 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bellare:2002:NNF,
  author =       "Mihir Bellare",
  title =        "A Note on Negligible Functions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "4",
  pages =        "271--284",
  month =        sep,
  year =         "2002",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0116-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:13 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Magliveras:2002:NAD,
  author =       "S. S. Magliveras and D. R. Stinson and Tran van
                 Trung",
  title =        "New Approaches to Designing Public Key Cryptosystems
                 Using One-Way Functions and Trapdoors in Finite
                 Groups",
  journal =      j-J-CRYPTOLOGY,
  volume =       "15",
  number =       "4",
  pages =        "285--297",
  month =        sep,
  year =         "2002",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-001-0018-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:13 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Myers:2003:EAS,
  author =       "Steven Myers",
  title =        "Efficient Amplification of the Security of Weak
                 Pseudo-Random Function Generators",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "1",
  pages =        "1--24",
  month =        jan,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0007-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:14 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Beimel:2003:BAM,
  author =       "Amos Beimel and Shlomi Dolev",
  title =        "Buses for Anonymous Message Delivery",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "1",
  pages =        "25--39",
  month =        jan,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0128-6",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:14 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Golic:2003:EPC,
  author =       "Jovan Dj. Golic and Renato Menicocci",
  title =        "Edit Probability Correlation Attacks on Stop\slash Go
                 Clocked Keystream Generators",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "1",
  pages =        "41--68",
  month =        jan,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-9925-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:14 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Goldreich:2003:SME,
  author =       "Oded Goldreich and Vered Rosen",
  title =        "On the Security of Modular Exponentiation with
                 Application to the Construction of Pseudorandom
                 Generators",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "2",
  pages =        "71--93",
  month =        mar,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0038-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:14 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Ben-Or:2003:THI,
  author =       "Michael Ben-Or and Dan Gutfreund",
  title =        "Trading Help for Interaction in Statistical
                 Zero-Knowledge Proofs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "2",
  pages =        "95--116",
  month =        mar,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0113-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:14 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Muller:2003:PPT,
  author =       "Siguna M{\"u}ller",
  title =        "A Probable Prime Test with Very High Confidence for
                 {$n L 3 \bmod 4$}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "2",
  pages =        "117--139",
  month =        mar,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0107-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:14 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  abstract =     "The workhorse of most compositeness tests is
                 Miller--Rabin, which works very fast in practice, but
                 may fail for one-quarter of all bases. We present an
                 alternative method to decide quickly whether a large
                 number $n$ is composite or probably prime. Our
                 algorithm is both based on the ideas of Pomerance,
                 Baillie, Selfridge, and Wagstaff, and on a suitable
                 combination of square, third, and fourth root testing
                 conditions. A composite number $n L 3 \bmod 4$ will
                 pass our test with probability less than 1/331,000, in
                 the worst case. For most numbers, the failure rate is
                 even smaller. Depending on the respective residue
                 classes $n$ modulo $3$ and $8$, we prove a worst-case
                 failure rate of less than $1/5,300,000$, $1/480,000$,
                 and $1/331,000$, respectively, for any iteration of our
                 test. Along with some fixed precomputation, our test
                 has running time about three times the time as for the
                 Miller--Rabin test. Implementation can be achieved very
                 efficiently by naive arithmetic only.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lindell:2003:PCT,
  author =       "Yehuda Lindell",
  title =        "Parallel Coin-Tossing and Constant-Round Secure
                 Two-Party Computation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "3",
  pages =        "143--184",
  month =        jun,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0143-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:15 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bellare:2003:OMR,
  author =       "M. Bellare and C. Namprempre and D. Pointcheval and M.
                 Semanko",
  title =        "The One-More-{RSA}-Inversion Problems and the Security
                 of {Chaum}'s Blind Signature Scheme",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "3",
  pages =        "185--215",
  month =        jun,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0120-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Nov 5 18:22:15 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Brassard:2003:OTP,
  author =       "Gilles Brassard and Claude Cr{\'e}peau and Stefan
                 Wolf",
  title =        "Oblivious Transfers and Privacy Amplification",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "4",
  pages =        "219--237",
  month =        sep,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0146-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Dec 11 06:01:25 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Joux:2003:SDD,
  author =       "Antoine Joux and Kim Nguyen",
  title =        "Separating Decision {Diffie--Hellman} from
                 Computational {Diffie--Hellman} in Cryptographic
                 Groups",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "4",
  pages =        "239--247",
  month =        sep,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-003-0052-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Dec 11 06:01:25 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Vaudenay:2003:DTB,
  author =       "Serge Vaudenay",
  title =        "Decorrelation: {A} Theory for Block Cipher Security",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "4",
  pages =        "249--286",
  month =        sep,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-003-0220-6",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Dec 11 06:01:25 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kalai:2003:GRF,
  author =       "Adam Kalai",
  title =        "Generating Random Factored Numbers, Easily",
  journal =      j-J-CRYPTOLOGY,
  volume =       "16",
  number =       "4",
  pages =        "287--289",
  month =        sep,
  year =         "2003",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-003-0051-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Dec 11 06:01:25 MST 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://people.cs.uchicago.edu/~kalai/factor/factor.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Goldreich:2004:P,
  author =       "Oded Goldreich",
  title =        "Preface",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "1",
  pages =        "1--3",
  month =        jan,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-003-1701-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Aug 3 15:21:45 MDT 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Dziembowski:2004:ORE,
  author =       "Stefan Dziembowski and Ueli Maurer",
  title =        "Optimal Randomizer Efficiency in the Bounded-Storage
                 Model",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "1",
  pages =        "5--26",
  month =        jan,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-003-0309-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Aug 3 15:21:45 MDT 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lu:2004:EAS,
  author =       "Chi-Jen Lu",
  title =        "Encryption against Storage-Bounded Adversaries from
                 On-Line Strong Extractors",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "1",
  pages =        "27--42",
  month =        jan,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-003-0217-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Aug 3 15:21:45 MDT 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Vadhan:2004:CLC,
  author =       "Salil P. Vadhan",
  title =        "Constructing Locally Computable Extractors and
                 Cryptosystems in the Bounded-Storage Model",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "1",
  pages =        "43--77",
  month =        jan,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-003-0237-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Aug 3 15:21:45 MDT 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fujisaki:2004:ROS,
  author =       "Eiichiro Fujisaki and Tatsuaki Okamoto and David
                 Pointcheval and Jacques Stern",
  title =        "{RSA-OAEP} Is Secure under the {RSA} Assumption",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "2",
  pages =        "81--104",
  month =        mar,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-002-0204-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Aug 3 15:21:45 MDT 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Wiener:2004:FCC,
  author =       "Michael J. Wiener",
  title =        "The Full Cost of Cryptanalytic Attacks",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "2",
  pages =        "105--124",
  month =        mar,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-003-0213-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Aug 3 15:21:45 MDT 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Beimel:2004:RSC,
  author =       "Amos Beimel and Yuval Ishai and Tal Malkin",
  title =        "Reducing the Servers --- Computation in {Private
                 Information Retrieval}: {PIR} with Preprocessing",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "2",
  pages =        "125--151",
  month =        mar,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0134-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Aug 3 15:21:45 MDT 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Canetti:2004:AVN,
  author =       "Ran Canetti and Ivan Damg{\aa}rd and Stefan
                 Dziembowski and Yuval Ishai and Tal Malkin",
  title =        "Adaptive versus Non-Adaptive Security of Multi-Party
                 Protocols",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "3",
  pages =        "153--207",
  month =        jun,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0135-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Aug 3 15:21:45 MDT 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hast:2004:NOS,
  author =       "Gustav Hast",
  title =        "Nearly One-Sided Tests and the {Goldreich--Levin}
                 Predicate",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "3",
  pages =        "209--229",
  month =        jun,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-003-0141-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Aug 3 15:21:45 MDT 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lenstra:2004:P,
  author =       "Arjen K. Lenstra",
  title =        "Preface",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "4",
  pages =        "233--233",
  month =        sep,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-1704-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:13 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=233",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Miller:2004:WPE,
  author =       "Victor S. Miller",
  title =        "The {Weil} Pairing, and Its Efficient Calculation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "4",
  pages =        "235--261",
  month =        sep,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0315-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:13 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=235",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Joux:2004:ORP,
  author =       "Antoine Joux",
  title =        "A One Round Protocol for Tripartite
                 {Diffie--Hellman}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "4",
  pages =        "263--276",
  month =        sep,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0312-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:13 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=263",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Verheul:2004:EXM,
  author =       "Eric R. Verheul",
  title =        "Evidence that {XTR} Is More Secure than Supersingular
                 Elliptic Curve Cryptosystems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "4",
  pages =        "277--296",
  month =        sep,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0313-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:13 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=277",
  abstract =     "We show that finding an efficiently computable
                 injective homomorphism from the XTR subgroup into the
                 group of points over $\mathrm{GF}(p^2)$ of a particular
                 type of supersingular elliptic curve is at least as
                 hard as solving the Diffie--Hellman problem in the XTR
                 subgroup. This provides strong evidence for a negative
                 answer to the question posed by Vanstone and Menezes at
                 the Crypto 2000 Rump Session on the possibility of
                 efficiently inverting the MOV embedding into the XTR
                 subgroup. As a side result we show that the Decision
                 Diffie--Hellman problem in the group of points on this
                 type of supersingular elliptic curves is efficiently
                 computable, which provides an example of a group where
                 the Decision Diffie--Hellman problem is simple, while
                 the Diffie--Hellman and discrete logarithm problems are
                 presumably not. So-called distortion maps on groups of
                 points on elliptic curves that play an important role
                 in our cryptanalysis also lead to cryptographic
                 applications of independent interest. These
                 applications are an improvement of Joux's one round
                 protocol for tripartite Diffie--Hellman key exchange
                 and a non-refutable digital signature scheme that
                 supports escrowable encryption. We also discuss the
                 applicability of our methods to general elliptic curves
                 defined over finite fields which includes a
                 classification of elliptic curve groups where
                 distortion maps exist.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Decision Diffie--Hellman problem; Escrow; Inverting
                 MOV embedding; Supersingular elliptic curves;
                 Tripartite Diffie--Hellman key exchange; XTR",
}

@Article{Boneh:2004:SSW,
  author =       "Dan Boneh and Ben Lynn and Hovav Shacham",
  title =        "Short Signatures from the {Weil} Pairing",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "4",
  pages =        "297--319",
  month =        sep,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0314-9",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:13 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=297",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Barreto:2004:EIP,
  author =       "Paulo S. L. M. Barreto and Ben Lynn and Michael
                 Scott",
  title =        "Efficient Implementation of Pairing-Based
                 Cryptosystems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "17",
  number =       "4",
  pages =        "321--334",
  month =        sep,
  year =         "2004",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0311-z",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:13 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=17&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=17&issue=4&spage=321",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Naor:2005:CSO,
  author =       "Moni Naor and Benny Pinkas",
  title =        "Computationally Secure Oblivious Transfer",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "1",
  pages =        "1--35",
  month =        jan,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0102-6",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:13 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=1&spage=1",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fitzi:2005:MCP,
  author =       "Matthias Fitzi and Juan A. Garay and Ueli Maurer and
                 others",
  title =        "Minimal Complete Primitives for Secure Multi-Party
                 Computation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "1",
  pages =        "37--61",
  month =        jan,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0150-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:13 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=1&spage=37",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Cohen:2005:ASW,
  author =       "Henri Cohen",
  title =        "Analysis of the Sliding Window Powering Algorithm",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "1",
  pages =        "63--76",
  month =        jan,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0218-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:13 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=1&spage=63",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Dupont:2005:BCA,
  author =       "R{\'e}gis Dupont and Andreas Enge and Fran{\c{c}}ois
                 Morain",
  title =        "Building Curves with Arbitrary Small {MOV} Degree over
                 Finite Prime Fields",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "2",
  pages =        "79--89",
  month =        apr,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0219-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:14 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=79",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Gennaro:2005:IPR,
  author =       "Rosario Gennaro",
  title =        "An Improved Pseudo-Random Generator Based on the
                 Discrete Logarithm Problem",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "2",
  pages =        "91--110",
  month =        apr,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0215-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:14 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=91",
  abstract =     "Under the assumption that solving the discrete
                 logarithm problem modulo an $n$-bit safe prime $p$ is
                 hard even when the exponent is a small $c$-bit number,
                 we construct a new pseudo-random bit generator. This
                 new generator outputs $n - c - 1$ bits per
                 exponentiation with a $c$-bit exponent and is among the
                 fastest generators based on hard number-theoretic
                 problems.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Black:2005:CMA,
  author =       "John Black and Phillip Rogaway",
  title =        "{CBC MACs} for Arbitrary-Length Messages: The
                 Three-Key Constructions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "2",
  pages =        "111--131",
  month =        apr,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0016-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:14 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=111",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lo:2005:EQK,
  author =       "Hoi-Kwong Lo and H. F. Chau and M. Ardehali",
  title =        "Efficient Quantum Key Distribution Scheme and a Proof
                 of Its Unconditional Security",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "2",
  pages =        "133--165",
  month =        apr,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0142-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:14 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=133",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Tassa:2005:LBD,
  author =       "Tamir Tassa",
  title =        "Low Bandwidth Dynamic Traitor Tracing Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "2",
  pages =        "167--183",
  month =        apr,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0214-z",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jul 5 06:57:14 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=2&spage=167",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Canetti:2005:P,
  author =       "Ran Canetti",
  title =        "Preface",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "3",
  pages =        "187--189",
  month =        jul,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-005-1803-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=3&spage=187",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Considine:2005:BAG,
  author =       "Jeffrey Considine and Matthias Fitzi and Matthew
                 Franklin and Leonid A. Levin and Ueli Maurer and David
                 Metcalf",
  title =        "{Byzantine} Agreement Given Partial Broadcast",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "3",
  pages =        "191--217",
  month =        jul,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-005-0308-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=3&spage=191",
  abstract =     "This paper considers unconditionally secure protocols
                 for reliable broadcast among a set of $n$ players,
                 where up to $t$ of the players can be corrupted by a
                 (Byzantine) adversary but the remaining $h = n - t$
                 players remain honest. In the standard model with a
                 complete, synchronous network of bilateral
                 authenticated communication channels among the players,
                 broadcast is achievable if and only if $2n/h < 3$. We
                 show that, by extending this model by the existence of
                 partial broadcast channels among subsets of $b$
                 players, global broadcast can be achieved if and only
                 if the number $h$ of honest players satisfies $2n/h < b
                 + 1$. Achievability is demonstrated by protocols with
                 communication and computation complexities polynomial
                 in the size of the network, i.e., in the number of
                 partial broadcast channels. A respective
                 characterization for the related consensus problem is
                 also given.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Broadcast; Byzantine agreement",
}

@Article{Cachin:2005:ROC,
  author =       "Christian Cachin and Klaus Kursawe and Victor Shoup",
  title =        "Random Oracles in {Constantinople}: Practical
                 Asynchronous {Byzantine} Agreement Using Cryptography",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "3",
  pages =        "219--246",
  month =        jul,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-005-0318-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=3&spage=219",
  abstract =     "Byzantine agreement requires a set of parties in a
                 distributed system to agree on a value even if some
                 parties are maliciously misbehaving. A new protocol for
                 Byzantine agreement in a completely asynchronous
                 network is presented that makes use of new
                 cryptographic protocols, specifically protocols for
                 threshold signatures and coin-tossing. These
                 cryptographic protocols have practical and provably
                 secure implementations in the random oracle model. In
                 particular, a coin-tossing protocol based on the
                 Diffie--Hellman problem is presented and analyzed. The
                 resulting asynchronous Byzantine agreement protocol is
                 both practical and theoretically optimal because it
                 tolerates the maximum number of corrupted parties, runs
                 in constant expected rounds, has message and
                 communication complexity close to the optimum, and uses
                 a trusted dealer only once in a setup phase, after
                 which it can process a virtually unlimited number of
                 transactions. The protocol is formulated as a
                 transaction processing service in a cryptographic
                 security model, which differs from the standard
                 information-theoretic formalization and may be of
                 independent interest.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Asynchronous consensus; Byzantine faults;
                 Cryptographic common coin; Dual-threshold schemes;
                 Threshold signatures",
}

@Article{Goldwasser:2005:SMP,
  author =       "Shafi Goldwasser and Yehuda Lindell",
  title =        "Secure Multi-Party Computation without Agreement",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "3",
  pages =        "247--287",
  month =        jul,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-005-0319-z",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=3&spage=247",
  abstract =     "It has recently been shown that authenticated
                 Byzantine agreement, in which more than a third of the
                 parties are corrupted, cannot be securely realized
                 under concurrent or parallel (stateless) composition.
                 This result puts into question any usage of
                 authenticated Byzantine agreement in a setting where
                 many executions take place. In particular, this is true
                 for the whole body of work of secure multi-party
                 protocols in the case that a third or more of the
                 parties are corrupted. This is because these protocols
                 strongly rely on the extensive use of a broadcast
                 channel, which is in turn realized using authenticated
                 Byzantine agreement. We remark that it was accepted
                 folklore that the use of a broadcast channel (or
                 authenticated Byzantine agreement) is actually
                 essential for achieving meaningful secure multi-party
                 computation whenever a third or more of the parties are
                 corrupted. In this paper we show that this folklore is
                 false. We present a mild relaxation of the definition
                 of secure computation allowing abort. Our new
                 definition captures all the central security issues of
                 secure computation, including privacy, correctness and
                 independence of inputs. However, the novelty of the
                 definition is in decoupling the issue of agreement from
                 these issues. We then show that this relaxation
                 suffices for achieving secure computation in a
                 point-to-point network. That is, we show that secure
                 multi-party computation for this definition can be
                 achieved for any number of corrupted parties and
                 without a broadcast channel (or trusted pre-processing
                 phase as required for running authenticated Byzantine
                 agreement). Furthermore, this is achieved by just
                 replacing the broadcast channel in known protocols with
                 a very simple and efficient echo-broadcast protocol. An
                 important corollary of our result is the ability to
                 obtain multi-party protocols that remain secure under
                 composition, without assuming a broadcast channel.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Broadcast; Protocol composition; Secure multi-party
                 computation",
}

@Article{Biham:2005:CSR,
  author =       "Eli Biham and Alex Biryukov and Adi Shamir",
  title =        "Cryptanalysis of {Skipjack} Reduced to $31$ Rounds
                 Using Impossible Differentials",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "4",
  pages =        "291--311",
  month =        sep,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-005-0129-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=291",
  abstract =     "In this paper we present a cryptanalytic technique,
                 based on impossible differentials. We use it to show
                 that recovering keys of Skipjack reduced from $32$ to
                 $31$ rounds can be performed faster than exhaustive
                 search. We also describe the Yoyo game (a tool that can
                 be used against reduced-round Skipjack), and other
                 properties of Skipjack.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Adaptive attacks; Cryptanalysis; Differential
                 cryptanalysis; Impossible differentials; Skipjack; Yoyo
                 game",
}

@Article{Kent:2005:SCB,
  author =       "Adrian Kent",
  title =        "Secure Classical Bit Commitment Using Fixed Capacity
                 Communication Channels",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "4",
  pages =        "313--335",
  month =        sep,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-005-0905-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=313",
  abstract =     "If mutually mistrustful parties A and B control two or
                 more appropriately located sites, special relativity
                 can be used to guarantee that a pair of messages
                 exchanged by A and B are independent. In earlier work
                 we used this fact to define a relativistic bit
                 commitment protocol, RBC1, in which security is
                 maintained by exchanging a sequence of messages whose
                 transmission rate increases exponentially in time. We
                 define here a new relativistic protocol, RBC2, which
                 requires only a constant transmission rate and could be
                 practically implemented. We prove that RBC2 allows a
                 bit commitment to be indefinitely maintained with
                 unconditional security against all classical attacks.
                 We examine its security against quantum attacks, and
                 show that it is immune from the class of attacks shown
                 by Mayers and Lo--Chau to render non-relativistic
                 quantum bit commitment protocols insecure.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Bit commitment; Quantum cryptography; Relativistic
                 cryptography",
}

@Article{vonzurGathen:2005:PNB,
  author =       "Joachim von zur Gathen and Michael N{\"o}cker",
  title =        "Polynomial and Normal Bases for Finite Fields",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "4",
  pages =        "337--355",
  month =        sep,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0221-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=337",
  abstract =     "We discuss two different ways to speed up
                 exponentiation in nonprime finite fields: on the one
                 hand, reduction of the total number of operations, and
                 on the other hand, fast computation of a single
                 operation. Two data structures are particularly useful:
                 sparse irreducible polynomials and normal bases. We
                 report on implementation results for our methods.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Avanzi:2005:CCM,
  author =       "Roberto M. Avanzi",
  title =        "The Complexity of Certain Multi-Exponentiation
                 Techniques in Cryptography",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "4",
  pages =        "357--373",
  month =        sep,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0229-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=357",
  abstract =     "We describe, analyze and compare some combinations of
                 multi-exponentiation algorithms with representations of
                 the exponents. We are especially interested in the case
                 where the inversion of group elements is fast: this is
                 true for example for elliptic curves, groups of
                 rational divisor classes of hyperelliptic curves, trace
                 zero varieties and XTR. The methods can also be used
                 for computing single exponentiations in groups which
                 admit an appropriate automorphism satisfying a monic
                 equation of small degree over the integers.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Elliptic and hyperelliptic curves; Exponentiation;
                 Groups with automorphisms; Integer recoding; Scalar
                 multiplication; Trace zero varieties; XTR",
}

@Article{Knudsen:2005:PKR,
  author =       "Lars R. Knudsen and Chris J. Mitchell",
  title =        "Partial Key Recovery Attack Against {RMAC}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "4",
  pages =        "375--389",
  month =        sep,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-004-0324-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=375",
  abstract =     "In this paper new ``partial'' key recovery attacks
                 against the RMAC block cipher based Message
                 Authentication Code scheme are described. That is we
                 describe attacks that, in some cases, recover one of
                 the two RMAC keys much more efficiently than previously
                 described attacks. Although all attacks, but one, are
                 of no major threat in practice, in some cases there is
                 reason for concern. In particular, the recovery of the
                 second RMAC key (of $k$ bits) may only require around
                 $2^{k/2}$ block cipher operations (encryptions or
                 decryptions). The RMAC implementation using triple DES
                 proposed by NIST is shown to be very weak.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "AES; Message Authentication Codes; RMAC; Triple DES",
}

@Article{Blundo:2005:ADD,
  author =       "Carlo Blundo and Paolo D'Arco",
  title =        "Analysis and Design of Distributed Key Distribution
                 Centers",
  journal =      j-J-CRYPTOLOGY,
  volume =       "18",
  number =       "4",
  pages =        "391--414",
  month =        sep,
  year =         "2005",
  CODEN =        "JOCREQ",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s00145-005-0407-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Oct 4 05:21:04 MDT 2005",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=18&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=18&issue=4&spage=391",
  abstract =     "A Key Distribution Center of a network is a server who
                 generates and distributes secret keys to groups of
                 users for secure communication. A Distributed Key
                 Distribution Center is a set of servers that jointly
                 realizes a Key Distribution Center. In this paper we
                 describe in terms of information theory a model for
                 Distributed Key Distribution Centers, and we present
                 lower bounds holding in the model for the main
                 resources needed to set up and manage a distributed
                 center, i.e., memory storage, randomness, and
                 bandwidth. Then we show that a previously proposed
                 protocol which uses a bidimensional extension of
                 Shamir's secret sharing scheme meets the bounds and is,
                 hence, optimal.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Cryptographic protocols; Distributed systems; Key
                 establishment",
}

@Article{Denef:2006:EKA,
  author =       "Jan Denef and Frederik Vercauteren",
  title =        "An Extension of {Kedlaya}'s Algorithm to Hyperelliptic
                 Curves in Characteristic $2$",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "1",
  pages =        "1--25",
  month =        jan,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-004-0231-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:45 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=1",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Cryptography; Hyperelliptic curves; Kedlaya's
                 algorithm; Monsky-Washnitzer cohomology",
}

@Article{MacKenzie:2006:TPA,
  author =       "Philip MacKenzie and Thomas Shrimpton and Markus
                 Jakobsson",
  title =        "Threshold Password-Authenticated Key Exchange",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "1",
  pages =        "27--66",
  month =        jan,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0232-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:45 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=27",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Dictionary attack; Key exchange; Password
                 authentication; Threshold cryptosystems",
}

@Article{Katz:2006:CSN,
  author =       "Jonathan Katz and Moti Yung",
  title =        "Characterization of Security Notions for Probabilistic
                 Private-Key Encryption",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "1",
  pages =        "67--95",
  month =        jan,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0310-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:45 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=67",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Definitions; Private-key encryptions",
}

@Article{Chang:2006:IBO,
  author =       "Yan-Cheng Chang and Chun-Yuan Hsiao and Chi-Jen Lu",
  title =        "The Impossibility of Basing One-Way Permutations on
                 Central Cryptographic Primitives",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "1",
  pages =        "97--114",
  month =        jan,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0317-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:45 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=97",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Black-box reductions; Cryptographic primitives;
                 One-way permutations; Private information retrieval;
                 Trapdoor functions",
}

@Article{Teske:2006:ECT,
  author =       "Edlyn Teske",
  title =        "An Elliptic Curve Trapdoor System",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "1",
  pages =        "115--133",
  month =        jan,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-004-0328-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:45 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=1&spage=115",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Elliptic curve cryptography; Isogenies; Key escrow;
                 Trapdoor functions; Weil descent",
}

@Article{Canetti:2006:LUC,
  author =       "Ran Canetti and Eyal Kushilevitz and Yehuda Lindell",
  title =        "On the Limitations of Universally Composable Two-Party
                 Computation Without Set-Up Assumptions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "2",
  pages =        "135--167",
  month =        apr,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0419-9",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:50 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=2&spage=135",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Impossibility results; Secure two-party computation;
                 Universal composability",
}

@Article{Garay:2006:SZK,
  author =       "Juan A. Garay and Philip MacKenzie and Ke Yang",
  title =        "Strengthening Zero-Knowledge Protocols Using
                 Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "2",
  pages =        "169--209",
  month =        apr,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0307-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:50 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=2&spage=169",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Non-malleability; Signatures; Simulation soundness;
                 Zero knowledge",
}

@Article{Jacobson:2006:IRQ,
  author =       "Michael J. Jacobson and Renate Scheidler and Hugh C.
                 Williams",
  title =        "An Improved Real-Quadratic-Field-Based Key Exchange
                 Procedure",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "2",
  pages =        "211--239",
  month =        apr,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0357-6",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:50 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=2&spage=211",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Cryptographic key exchange; NUCOMP; Real quadratic
                 field; Reduced principal ideal",
}

@Article{Goldreich:2006:SKG,
  author =       "Oded Goldreich and Yehuda Lindell",
  title =        "Session-Key Generation Using Human Passwords Only",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "3",
  pages =        "241--340",
  month =        jul,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0233-z",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:53 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=3&spage=241",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Blaser:2006:PCC,
  author =       "Markus Bl{\"a}ser and Andreas Jakoby and Maciej
                 Liskiewicz and Bodo Manthey",
  title =        "Private Computation: $k$-Connected versus
                 $1$-Connected Networks",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "3",
  pages =        "341--357",
  month =        jul,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0329-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:53 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=3&spage=341",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Connectivity; Parity; Private computation; Randomness;
                 Secure function evaluation; Secure multi-party
                 computation",
}

@Article{Lindell:2006:SCC,
  author =       "Yehuda Lindell",
  title =        "A Simpler Construction of {CCA2}-Secure Public-Key
                 Encryption under General Assumptions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "3",
  pages =        "359--377",
  month =        jul,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0345-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:53 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=3&spage=359",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Adaptive chosen-ciphertext attacks; Public-key
                 encryption; Simulation-sound non-interactive
                 zero-knowledge",
}

@Article{Biham:2006:PSQ,
  author =       "Eli Biham and Michel Boyer and P. Oscar Boykin and Tal
                 Mor and Vwani Roychowdhury",
  title =        "A Proof of the Security of Quantum Key Distribution",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "4",
  pages =        "381--439",
  month =        oct,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0011-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:56 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=381",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Information versus disturbance; Quantum information;
                 Quantum key distribution; Quantum security",
}

@Article{Hong:2006:KIK,
  author =       "Deukjo Hong and Seokhie Hong and Wonil Lee and Sangjin
                 Lee and Jongin Lim and Jaechul Sung and Okyeon Yi",
  title =        "Known-{IV}, Known-in-Advance-{IV}, and
                 Replayed-and-Known-{IV} Attacks on Multiple Modes of
                 Operation of Block Ciphers",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "4",
  pages =        "441--462",
  month =        oct,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0205-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:56 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=441",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Girault:2006:FAS,
  author =       "Marc Girault and Guillaume Poupard and Jacques Stern",
  title =        "On the Fly Authentication and Signature Schemes Based
                 on Groups of Unknown Order",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "4",
  pages =        "463--487",
  month =        oct,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0224-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:56 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=463",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Damgard:2006:EQF,
  author =       "Ivan Bjerre Damgard and Gudmund Skovbjerg Frandsen",
  title =        "An Extended Quadratic {Frobenius} Primality Test with
                 Average- and Worst-Case Error Estimate",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "4",
  pages =        "489--520",
  month =        oct,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0332-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:56 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=489",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Harnik:2006:CTP,
  author =       "Danny Harnik and Moni Naor and Omer Reingold and Alon
                 Rosen",
  title =        "Completeness in Two-Party Secure Computation: {A}
                 Computational View",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "4",
  pages =        "521--552",
  month =        oct,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0346-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:56 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=521",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Luca:2006:ECL,
  author =       "Florian Luca and Igor E. Shparlinski",
  title =        "Elliptic Curves with Low Embedding Degree",
  journal =      j-J-CRYPTOLOGY,
  volume =       "19",
  number =       "4",
  pages =        "553--562",
  month =        oct,
  year =         "2006",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0544-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:33:56 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=19&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=19&issue=4&spage=553",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Anonymous:2007:EN,
  author =       "Anonymous",
  title =        "{Editor}'s Note",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "1",
  pages =        "1--1",
  month =        jan,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-5001-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:01 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=1",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Koblitz:2007:ALS,
  author =       "Neal Koblitz and Alfred J. Menezes",
  title =        "Another Look at ``Provable Security''",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "1",
  pages =        "3--37",
  month =        jan,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-005-0432-z",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:01 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=3",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Coron:2007:DPT,
  author =       "Jean-Sebastien Coron and Alexander May",
  title =        "Deterministic Polynomial-Time Equivalence of Computing
                 the {RSA} Secret Key and Factoring",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "1",
  pages =        "39--50",
  month =        jan,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0433-6",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:01 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=39",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Gennaro:2007:SDK,
  author =       "Rosario Gennaro and Stanislaw Jarecki and Hugo
                 Krawczyk and Tal Rabin",
  title =        "Secure Distributed Key Generation for Discrete-Log
                 Based Cryptosystems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "1",
  pages =        "51--83",
  month =        jan,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0347-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:01 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=51",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Katz:2007:SPA,
  author =       "Jonathan Katz and Moti Yung",
  title =        "Scalable Protocols for Authenticated Group Key
                 Exchange",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "1",
  pages =        "85--113",
  month =        jan,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0361-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:01 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=85",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Catalano:2007:THI,
  author =       "Dario Catalano and David Pointcheval and Thomas
                 Pornin",
  title =        "Trapdoor Hard-to-Invert Group Isomorphisms and Their
                 Application to Password-Based Authentication",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "1",
  pages =        "115--149",
  month =        jan,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0431-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:01 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=1&spage=115",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Haastad:2007:SII,
  author =       "Johan H{\aa}stad",
  title =        "The Security of the {IAPM} and {IACBC} Modes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "2",
  pages =        "153--163",
  month =        apr,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0225-z",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:07 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=2&spage=153",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Ding:2007:CRO,
  author =       "Yan Zong Ding and Danny Harnik and Alon Rosen and
                 Ronen Shaltiel",
  title =        "Constant-Round Oblivious Transfer in the Bounded
                 Storage Model",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "2",
  pages =        "165--202",
  month =        apr,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0438-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:07 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=2&spage=165",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Baek:2007:FPS,
  author =       "Joonsang Baek and Ron Steinfeld and Yuliang Zheng",
  title =        "Formal Proofs for the Security of Signcryption",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "2",
  pages =        "203--235",
  month =        apr,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0211-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:07 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=2&spage=203",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Tassa:2007:HTS,
  author =       "Tamir Tassa",
  title =        "Hierarchical Threshold Secret Sharing",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "2",
  pages =        "237--264",
  month =        apr,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0334-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:07 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=2&spage=237",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Canetti:2007:FSP,
  author =       "Ran Canetti and Shai Halevi and Jonathan Katz",
  title =        "A Forward-Secure Public-Key Encryption Scheme",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "3",
  pages =        "265--294",
  month =        jul,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0442-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:11 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=265",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Beimel:2007:RIT,
  author =       "Amos Beimel and Yoav Stahl",
  title =        "Robust Information-Theoretic Private Information
                 Retrieval",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "3",
  pages =        "295--321",
  month =        jul,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0424-2",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:11 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=295",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Blundo:2007:USD,
  author =       "Carlo Blundo and Paolo D'Arco and Alfredo {De Santis}
                 and Douglas Stinson",
  title =        "On Unconditionally Secure Distributed Oblivious
                 Transfer",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "3",
  pages =        "323--373",
  month =        jul,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0327-2",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:11 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=323",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Cheng:2007:PPO,
  author =       "Qi Cheng",
  title =        "Primality Proving via One Round in {ECPP} and One
                 Iteration in {AKS}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "3",
  pages =        "375--387",
  month =        jul,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-006-0406-9",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:11 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=375",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Tsaban:2007:TCK,
  author =       "Boaz Tsaban",
  title =        "Theoretical Cryptanalysis of the {Klimov--Shamir}
                 Number Generator {TF-1}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "3",
  pages =        "389--392",
  month =        jul,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0564-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:11 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=389",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Gennaro:2007:RES,
  author =       "Rosario Gennaro and Tal Rabin and Stanislav Jarecki
                 and Hugo Krawczyk",
  title =        "Robust and Efficient Sharing of {RSA} Functions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "3",
  pages =        "393--393",
  month =        jul,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0201-2",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:11 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=393",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Gennaro:2007:RBU,
  author =       "Rosario Gennaro and Tal Rabin and Hugo Krawczyk",
  title =        "{RSA}-Based Undeniable Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "3",
  pages =        "394--394",
  month =        jul,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0202-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:11 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=394",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Abadi:2007:RTV,
  author =       "Martin Abadi and Phillip Rogaway",
  title =        "Reconciling Two Views of Cryptography (The
                 Computational Soundness of Formal Encryption)",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "3",
  pages =        "395--395",
  month =        jul,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0203-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:11 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=3&spage=395",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Ostrovsky:2007:PSS,
  author =       "Rafail Ostrovsky and William E. Skeith",
  title =        "Private Searching on Streaming Data",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "4",
  pages =        "397--430",
  month =        oct,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0565-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:44 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=4&spage=397",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kalai:2007:CCS,
  author =       "Yael Tauman Kalai and Yehuda Lindell and Manoj
                 Prabhakaran",
  title =        "Concurrent Composition of Secure Protocols in the
                 Timing Model",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "4",
  pages =        "431--492",
  month =        oct,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0567-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:44 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=4&spage=431",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Goh:2007:ESS,
  author =       "Eu-Jin Goh and Stanislaw Jarecki and Jonathan Katz and
                 Nan Wang",
  title =        "Efficient Signature Schemes with Tight Reductions to
                 the {Diffie--Hellman} Problems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "20",
  number =       "4",
  pages =        "493--514",
  month =        oct,
  year =         "2007",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-0549-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:44 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=20&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=20&issue=4&spage=493",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Haastad:2008:PCA,
  author =       "Johan H{\aa}stad and Mats N{\"a}slund",
  title =        "Practical Construction and Analysis of
                 Pseudo-Randomness Primitives",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "1",
  pages =        "1--26",
  month =        jan,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9009-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:47 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=1",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Exact security; Hard core function; One-way function;
                 Pseudo random generator",
}

@Article{Coppersmith:2008:CII,
  author =       "D. Coppersmith and J. S. Coron and F. Grieu and S.
                 Halevi and C. Jutla and D. Naccache and J. P. Stern",
  title =        "Cryptanalysis of {ISO/IEC 9796-1}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "1",
  pages =        "27--51",
  month =        jan,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9007-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:47 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=27",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Cryptanalysis; Encoding scheme; ISO/IEC 9796-1
                 signature standard; Rabin signatures; RSA signatures",
}

@Article{Nguyen:2008:SSK,
  author =       "Minh-Huyen Nguyen and Salil Vadhan",
  title =        "Simpler Session-Key Generation from Short Random
                 Passwords",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "1",
  pages =        "52--96",
  month =        jan,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9008-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:47 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=52",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Authentication; Cryptographic protocols;
                 Human-memorizable passwords; Key exchange; Secure
                 two-party computation",
}

@Article{Abe:2008:TKN,
  author =       "Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa",
  title =        "{Tag-KEM\slash DEM}: {A} New Framework for Hybrid
                 Encryption",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "1",
  pages =        "97--130",
  month =        jan,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9010-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:47 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=97",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Hybrid encryption; Key encapsulation; Tag-KEM;
                 Threshold encryption",
}

@Article{Selcuk:2008:PSL,
  author =       "Ali Ayd{\i}n Sel{\c{c}}uk",
  title =        "On Probability of Success in Linear and Differential
                 Cryptanalysis",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "1",
  pages =        "131--147",
  month =        jan,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9013-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:47 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=1&spage=131",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Block ciphers; Differential cryptanalysis; Linear
                 cryptanalysis; Order statistics; Success probability",
}

@Article{Boneh:2008:SSR,
  author =       "Dan Boneh and Xavier Boyen",
  title =        "Short Signatures Without Random Oracles and the {SDH}
                 Assumption in Bilinear Groups",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "2",
  pages =        "149--177",
  month =        apr,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9005-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:52 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=149",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Bilinear pairings; Digital signatures; Standard model;
                 Strong unforgeability",
}

@Article{Bentahar:2008:GCI,
  author =       "K. Bentahar and P. Farshim and J. Malone-Lee and N. P.
                 Smart",
  title =        "Generic Constructions of Identity-Based and
                 Certificateless {KEMs}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "2",
  pages =        "178--199",
  month =        apr,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9000-z",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:52 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=178",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lindell:2008:LBI,
  author =       "Yehuda Lindell",
  title =        "Lower Bounds and Impossibility Results for Concurrent
                 Self Composition",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "2",
  pages =        "200--249",
  month =        apr,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9015-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:52 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=200",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Impossibility results; Lower bounds; Non-black-box and
                 black-box simulation; Protocol composition; Secure
                 computation; Self and general composition",
}

@Article{Renault:2008:PRP,
  author =       "J{\'e}r{\^o}me Renault and Tristan Tomala",
  title =        "Probabilistic Reliability and Privacy of Communication
                 Using Multicast in General Neighbor Networks",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "2",
  pages =        "250--279",
  month =        apr,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9018-2",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:52 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=250",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Communication networks; Graphs; Incomplete
                 information; Multicast; Repeated games; Security",
}

@Article{Overbeck:2008:SAP,
  author =       "R. Overbeck",
  title =        "Structural Attacks for Public Key Cryptosystems based
                 on {Gabidulin} Codes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "2",
  pages =        "280--301",
  month =        apr,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9003-9",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:52 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=2&spage=280",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Code based cryptography; Gabidulin codes; Public key
                 cryptography; Rank distance codes",
}

@Article{Katz:2008:HEP,
  author =       "Jonathan Katz and Yehuda Lindell",
  title =        "Handling Expected Polynomial-Time Strategies in
                 Simulation-Based Security Proofs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "3",
  pages =        "303--349",
  month =        jul,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9004-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:57 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=303",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Black-box simulation; Expected polynomial-time; Secure
                 multiparty computation; Zero-knowledge",
}

@Article{Abdalla:2008:SER,
  author =       "Michel Abdalla and Mihir Bellare and Dario Catalano
                 and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and
                 John Malone-Lee and Gregory Neven and Pascal Paillier
                 and Haixia Shi",
  title =        "Searchable Encryption Revisited: Consistency
                 Properties, Relation to Anonymous {IBE}, and
                 Extensions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "3",
  pages =        "350--391",
  month =        jul,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9006-6",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:57 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=350",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Anonymity; Foundations; Identity-based encryption;
                 Random-oracle model; Searchable encryption",
}

@Article{Barkan:2008:ICO,
  author =       "Elad Barkan and Eli Biham and Nathan Keller",
  title =        "Instant Ciphertext-Only Cryptanalysis of {GSM}
                 Encrypted Communication",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "3",
  pages =        "392--429",
  month =        jul,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9001-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:57 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=392",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "A5/1; A5/2; Cellular; Ciphertext-only; Cryptanalysis;
                 GPRS; GSM; SIM; SMS",
}

@Article{Lu:2008:CEL,
  author =       "Yi Lu and Serge Vaudenay",
  title =        "Cryptanalysis of an {E0}-like Combiner with Memory",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "3",
  pages =        "430--457",
  month =        jul,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9017-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:57 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=430",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Bluetooth; Combiner; Correlation; E0; Stream cipher",
}

@Article{Matucci:2008:CSP,
  author =       "Francesco Matucci",
  title =        "Cryptanalysis of the {Shpilrain--Ushakov} Protocol for
                 {Thompson}'s Group",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "3",
  pages =        "458--468",
  month =        jul,
  year =         "2008",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-007-9016-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Jul 9 16:34:57 MDT 2008",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=3&spage=458",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Conjugacy problem; Decomposition problem; Infinite
                 groups; Normal form; Piecewise-linear homeomorphism",
}

@Article{Bellare:2008:AER,
  author =       "Mihir Bellare and Chanathip Namprempre",
  title =        "Authenticated Encryption: Relations among Notions and
                 Analysis of the Generic Composition Paradigm",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "4",
  pages =        "469--491",
  month =        oct,
  year =         "2008",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:58 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=469",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{KAsters:2008:RBN,
  author =       "Ralf K{\"u}sters and Anupam Datta and John C. Mitchell
                 and Ajith Ramanathan",
  title =        "On the Relationships between Notions of
                 Simulation-Based Security",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "4",
  pages =        "492--546",
  month =        oct,
  year =         "2008",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:58 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=492",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Jutla:2008:EMA,
  author =       "Charanjit S. Jutla",
  title =        "Encryption Modes with Almost Free Message Integrity",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "4",
  pages =        "547--578",
  month =        oct,
  year =         "2008",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:58 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=547",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Jain:2008:NBC,
  author =       "Rahul Jain",
  title =        "New Binding-Concealing Trade-Offs for Quantum String
                 Commitment",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "4",
  pages =        "579--592",
  month =        oct,
  year =         "2008",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:58 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=579",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Diem:2008:ICC,
  author =       "Claus Diem and Emmanuel Thom{\'e}",
  title =        "Index Calculus in Class Groups of Non-hyperelliptic
                 Curves of Genus Three",
  journal =      j-J-CRYPTOLOGY,
  volume =       "21",
  number =       "4",
  pages =        "593--611",
  month =        oct,
  year =         "2008",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:58 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=21&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=21&issue=4&spage=593",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bellare:2009:SPI,
  author =       "Mihir Bellare and Chanathip Namprempre and Gregory
                 Neven",
  title =        "Security Proofs for Identity-Based Identification and
                 Signature Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "1",
  pages =        "1--61",
  month =        jan,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:59 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=1",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lempken:2009:PKC,
  author =       "Wolfgang Lempken and Trung van Tran and Spyros S.
                 Magliveras and Wandi Wei",
  title =        "A Public Key Cryptosystem Based on Non-abelian Finite
                 Groups",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "1",
  pages =        "62--74",
  month =        jan,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:59 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=62",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Impagliazzo:2009:CTD,
  author =       "Russell Impagliazzo and Ragesh Jaiswal and Valentine
                 Kabanets",
  title =        "{Chernoff}-Type Direct Product Theorems",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "1",
  pages =        "75--92",
  month =        jan,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:59 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=75",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Charles:2009:CHF,
  author =       "Denis X. Charles and Kristin E. Lauter and Eyal Z.
                 Goren",
  title =        "Cryptographic Hash Functions from Expander Graphs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "1",
  pages =        "93--113",
  month =        jan,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:59 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=93",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bender:2009:RSS,
  author =       "Adam Bender and Jonathan Katz and Ruggero Morselli",
  title =        "Ring Signatures: Stronger Definitions, and
                 Constructions without Random Oracles",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "1",
  pages =        "114--138",
  month =        jan,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:38:59 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=1&spage=114",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Nguyen:2009:LPC,
  author =       "Phong Q. Nguyen and Oded Regev",
  title =        "Learning a Parallelepiped: Cryptanalysis of {GGH} and
                 {NTRU} Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "2",
  pages =        "139--160",
  month =        apr,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:01 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=139",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lindell:2009:PSY,
  author =       "Yehuda Lindell and Benny Pinkas",
  title =        "A Proof of Security of {Yao}'s Protocol for Two-Party
                 Computation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "2",
  pages =        "161--188",
  month =        apr,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:01 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=161",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Moran:2009:NIT,
  author =       "Tal Moran and Ronen Shaltiel and Amnon Ta-Shma",
  title =        "Non-interactive Timestamping in the Bounded-Storage
                 Model",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "2",
  pages =        "189--226",
  month =        apr,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:01 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=189",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Tassa:2009:MSS,
  author =       "Tamir Tassa and Nira Dyn",
  title =        "Multipartite Secret Sharing by Bivariate
                 Interpolation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "2",
  pages =        "227--258",
  month =        apr,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:01 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=227",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Barbosa:2009:CDU,
  author =       "M. Barbosa and A. Moss and D. Page",
  title =        "Constructive and Destructive Use of Compilers in
                 Elliptic Curve Cryptography",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "2",
  pages =        "259--281",
  month =        apr,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:01 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=2&spage=259",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Haitner:2009:RCA,
  author =       "Iftach Haitner and Omer Horvitz and Jonathan Katz and
                 Chiu-Yuen Koo and Ruggero Morselli and others",
  title =        "Reducing Complexity Assumptions for
                 Statistically-Hiding Commitment",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "3",
  pages =        "283--310",
  month =        jul,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:02 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=283",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Black:2009:IHE,
  author =       "J. Black and M. Cochran and T. Shrimpton",
  title =        "On the Impossibility of Highly-Efficient
                 Blockcipher-Based Hash Functions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "3",
  pages =        "311--329",
  month =        jul,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:02 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=311",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Rubin:2009:UAV,
  author =       "K. Rubin and A. Silverberg",
  title =        "Using {Abelian} Varieties to Improve Pairing-Based
                 Cryptography",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "3",
  pages =        "330--364",
  month =        jul,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:02 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=330",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Dedic:2009:ULB,
  author =       "Nenad Dedi{\'c} and Gene Itkis and Leonid Reyzin and
                 Scott Russell",
  title =        "Upper and Lower Bounds on Black-Box Steganography",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "3",
  pages =        "365--394",
  month =        jul,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:02 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=365",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lindell:2009:GCU,
  author =       "Yehuda Lindell",
  title =        "General Composition and Universal Composability in
                 Secure Multiparty Computation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "3",
  pages =        "395--428",
  month =        jul,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:02 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=3&spage=395",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Applebaum:2009:CCI,
  author =       "Benny Applebaum and Yuval Ishai and Eyal Kushilevitz",
  title =        "Cryptography with Constant Input Locality",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "4",
  pages =        "429--469",
  month =        oct,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:03 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=429",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Cash:2009:TDP,
  author =       "David Cash and Eike Kiltz and Victor Shoup",
  title =        "The Twin {Diffie--Hellman} Problem and Applications",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "4",
  pages =        "470--504",
  month =        oct,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:03 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=470",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Smith:2009:IDL,
  author =       "Benjamin Smith",
  title =        "Isogenies and the Discrete Logarithm Problem in
                 {Jacobians} of Genus $3$ Hyperelliptic Curves",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "4",
  pages =        "505--529",
  month =        oct,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:03 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=505",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fischlin:2009:ENM,
  author =       "Marc Fischlin and Roger Fischlin",
  title =        "Efficient Non-malleable Commitment Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "4",
  pages =        "530--571",
  month =        oct,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:03 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=530",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{DiRaimondo:2009:NAD,
  author =       "Mario {Di Raimondo} and Rosario Gennaro",
  title =        "New Approaches for Deniable Authentication",
  journal =      j-J-CRYPTOLOGY,
  volume =       "22",
  number =       "4",
  pages =        "572--615",
  month =        oct,
  year =         "2009",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:03 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=22&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=22&issue=4&spage=572",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Goldreich:2010:EPP,
  author =       "Oded Goldreich",
  title =        "On Expected Probabilistic Polynomial-Time Adversaries:
                 {A} Suggestion for Restricted Definitions and Their
                 Benefits",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "1",
  pages =        "1--36",
  month =        jan,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:05 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=1",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Tromer:2010:ECA,
  author =       "Eran Tromer and Dag Arne Osvik and Adi Shamir",
  title =        "Efficient Cache Attacks on {AES}, and
                 Countermeasures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "1",
  pages =        "37--71",
  month =        jan,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:05 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=37",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Knudsen:2010:CM,
  author =       "Lars R. Knudsen and John Erik Mathiassen and
                 Fr{\'e}d{\'e}ric Muller and S{\o}ren S. Thomsen",
  title =        "Cryptanalysis of {MD2}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "1",
  pages =        "72--90",
  month =        jan,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:05 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=72",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Desmedt:2010:NIP,
  author =       "Yvo Desmedt and Rosario Gennaro and Kaoru Kurosawa and
                 Victor Shoup",
  title =        "A New and Improved Paradigm for Hybrid Encryption
                 Secure Against Chosen-Ciphertext Attack",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "1",
  pages =        "91--120",
  month =        jan,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:05 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=91",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hofheinz:2010:OCP,
  author =       "Dennis Hofheinz and John Malone-Lee and Martijn Stam",
  title =        "Obfuscation for Cryptographic Purposes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "1",
  pages =        "121--168",
  month =        jan,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:05 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=1&spage=121",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Micciancio:2010:RGP,
  author =       "Daniele Micciancio",
  title =        "The {RSA} Group is Pseudo-Free",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "2",
  pages =        "169--186",
  month =        apr,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:06 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=169",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Morrissey:2010:THP,
  author =       "P. Morrissey and N. P. Smart and B. Warinschi",
  title =        "The {TLS} Handshake Protocol: {A} Modular Analysis",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "2",
  pages =        "187--223",
  month =        apr,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:06 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=187",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Freeman:2010:TPF,
  author =       "David Freeman and Michael Scott and Edlyn Teske",
  title =        "A Taxonomy of Pairing-Friendly Elliptic Curves",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "2",
  pages =        "224--280",
  month =        apr,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:06 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=224",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Aumann:2010:SAC,
  author =       "Yonatan Aumann and Yehuda Lindell",
  title =        "Security Against Covert Adversaries: Efficient
                 Protocols for Realistic Adversaries",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "2",
  pages =        "281--343",
  month =        apr,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:06 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=281",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Beimel:2010:HSW,
  author =       "Amos Beimel and Tal Malkin and Kobbi Nissim and Enav
                 Weinreb",
  title =        "How Should We Solve Search Problems Privately?",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "2",
  pages =        "344--371",
  month =        apr,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:06 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=2&spage=344",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Aggarwal:2010:SCM,
  author =       "Gagan Aggarwal and Nina Mishra and Benny Pinkas",
  title =        "Secure Computation of the Median (and Other Elements
                 of Specified Ranks)",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "3",
  pages =        "373--401",
  month =        jul,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:07 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=373",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Katz:2010:PCS,
  author =       "Jonathan Katz and Ji Sun Shin and Adam Smith",
  title =        "Parallel and Concurrent Security of the {HB} and
                 {HB$^+$} Protocols",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "3",
  pages =        "402--421",
  month =        jul,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:07 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=402",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hazay:2010:EPS,
  author =       "Carmit Hazay and Yehuda Lindell",
  title =        "Efficient Protocols for Set Intersection and Pattern
                 Matching with Security Against Malicious and Covert
                 Adversaries",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "3",
  pages =        "422--456",
  month =        jul,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:07 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=422",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Cheon:2010:DLP,
  author =       "Jung Hee Cheon",
  title =        "Discrete Logarithm Problems with Auxiliary Inputs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "3",
  pages =        "457--476",
  month =        jul,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:07 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=457",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Konstantinou:2010:EGP,
  author =       "Elisavet Konstantinou and Aristides Kontogeorgis and
                 Yannis C. Stamatiou and Christos Zaroliagis",
  title =        "On the Efficient Generation of Prime-Order Elliptic
                 Curves",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "3",
  pages =        "477--503",
  month =        jul,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Wed Aug 25 09:39:07 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=3&spage=477",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Biryukov:2010:SCS,
  author =       "Alex Biryukov and Adi Shamir",
  title =        "Structural Cryptanalysis of {SASAS}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "4",
  pages =        "505--518",
  month =        oct,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:42 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=505",
  abstract =     "In this paper we consider the security of block
                 ciphers which contain alternate layers of invertible
                 S-boxes and affine mappings (there are many popular
                 cryptosystems which use this structure, including the
                 winner of the AES competition, Rijndael). We show that
                 a five-layer scheme with 128-bit plaintexts and 8-bit
                 S-boxes is surprisingly weak against what we call a
                 multiset attack, even when all the S-boxes and affine
                 mappings are key dependent (and thus completely unknown
                 to the attacker). We tested the multiset attack with an
                 actual implementation, which required just $2^{16}$
                 chosen plaintexts and a few seconds on a single PC to
                 find the $2^{17}$ bits of information in all the
                 unknown elements of the scheme.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Black:2010:ABB,
  author =       "J. Black and P. Rogaway and T. Shrimpton and M. Stam",
  title =        "An Analysis of the Blockcipher--Based Hash Functions
                 from {PGV}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "4",
  pages =        "519--545",
  month =        oct,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:42 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=519",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Groth:2010:VSS,
  author =       "Jens Groth",
  title =        "A Verifiable Secret Shuffle of Homomorphic
                 Encryptions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "4",
  pages =        "546--579",
  month =        oct,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:42 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=546",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Barkol:2010:MSS,
  author =       "Omer Barkol and Yuval Ishai and Enav Weinreb",
  title =        "On $d$-Multiplicative Secret Sharing",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "4",
  pages =        "580--593",
  month =        oct,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:42 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=580",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Muller-Quade:2010:LTS,
  author =       "J{\"o}rn M{\"u}ller-Quade and Dominique Unruh",
  title =        "Long-Term Security and Universal Composability",
  journal =      j-J-CRYPTOLOGY,
  volume =       "23",
  number =       "4",
  pages =        "594--671",
  month =        oct,
  year =         "2010",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:42 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=23&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=23&issue=4&spage=594",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Indesteege:2011:PCE,
  author =       "Sebastiaan Indesteege and Bart Preneel",
  title =        "Practical Collisions for {EnRUPT}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "1",
  pages =        "1--23",
  month =        jan,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:43 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=1",
  abstract =     "The EnRUPT hash functions were proposed by O Neil,
                 Nohl and Henzen as candidates for the SHA-3
                 competition, organised by NIST. The proposal contains
                 seven concrete hash functions, each with a different
                 digest length. We present a practical collision attack
                 on each of these seven EnRUPT variants. The time
                 complexity of our attack varies from $2^{36}$ to
                 $2^{40}$ round computations, depending on the EnRUPT
                 variant, and the memory requirements are negligible. We
                 demonstrate that our attack is practical by giving an
                 actual collision example for EnRUPT-256.",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "Collision attack; EnRUPT; Hash function; SHA-3
                 candidate",
}

@Article{Enge:2011:DLA,
  author =       "Andreas Enge and Pierrick Gaudry and Emmanuel
                 Thom{\'e}",
  title =        "An {$L(1/3)$} Discrete Logarithm Algorithm for Low
                 Degree Curves",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "1",
  pages =        "24--41",
  month =        jan,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:43 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=24",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Abdalla:2011:WIB,
  author =       "Michel Abdalla and James Birkett and Dario Catalano
                 and Alexander W. Dent and John Malone-Lee and Gregory
                 Neven and Jacob C. N. Schuldt and Nigel P. Smart",
  title =        "Wildcarded Identity-Based Encryption",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "1",
  pages =        "42--82",
  month =        jan,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:43 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=42",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Canetti:2011:UCS,
  author =       "Ran Canetti and Jonathan Herzog",
  title =        "Universally Composable Symbolic Security Analysis",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "1",
  pages =        "83--147",
  month =        jan,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:43 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=83",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Grassl:2011:CTZ,
  author =       "Markus Grassl and Ivana Ili\'c and Spyros Magliveras
                 and Rainer Steinwandt",
  title =        "Cryptanalysis of the {Tillich--Z{\'e}mor} Hash
                 Function",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "1",
  pages =        "148--156",
  month =        jan,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:43 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=148",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Asharov:2011:UDC,
  author =       "Gilad Asharov and Yehuda Lindell",
  title =        "Utility Dependence in Correct and Fair Rational Secret
                 Sharing",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "1",
  pages =        "157--202",
  month =        jan,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:43 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=157",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fischlin:2011:ENM,
  author =       "Marc Fischlin and Roger Fischlin",
  title =        "Efficient Non-Malleable Commitment Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "1",
  pages =        "203--244",
  month =        jan,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Jan 10 17:59:43 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=1&spage=203",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Paar:2011:GE,
  author =       "Christof Paar and Jean-Jacques Quisquater and Berk
                 Sunar",
  title =        "Guest Editorial",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "2",
  pages =        "245--246",
  month =        apr,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:08 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=245",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Canivet:2011:GLF,
  author =       "G. Canivet and P. Maistri and R. Leveugle and J.
                 Cl{\'e}di{\`e}re and F. Valette and M. Renaudin",
  title =        "Glitch and Laser Fault Attacks onto a Secure {AES}
                 Implementation on a {SRAM}-Based {FPGA}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "2",
  pages =        "247--268",
  month =        apr,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:08 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=247",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Batina:2011:MIA,
  author =       "Lejla Batina and Benedikt Gierlichs and Emmanuel
                 Prouff and Matthieu Rivain and Fran{\c{c}}ois-Xavier
                 Standaert and Nicolas Veyrat-Charvillon",
  title =        "Mutual Information Analysis: a Comprehensive Study",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "2",
  pages =        "269--291",
  month =        apr,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:08 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=269",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Nikova:2011:SHI,
  author =       "Svetla Nikova and Vincent Rijmen and Martin
                 Schl{\"a}ffer",
  title =        "Secure Hardware Implementation of Nonlinear Functions
                 in the Presence of Glitches",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "2",
  pages =        "292--321",
  month =        apr,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:08 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=292",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Poschmann:2011:SCR,
  author =       "Axel Poschmann and Amir Moradi and Khoongming Khoo and
                 Chu-Wee Lim and Huaxiong Wang and San Ling",
  title =        "Side-Channel Resistant Crypto for Less than 2,300
                 {GE}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "2",
  pages =        "322--345",
  month =        apr,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:08 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=322",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Dominguez-Oviedo:2011:FBA,
  author =       "Agustin Dominguez-Oviedo and M. Anwar Hasan and Bijan
                 Ansari",
  title =        "Fault-Based Attack on {Montgomery}'s Ladder
                 Algorithm",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "2",
  pages =        "346--374",
  month =        apr,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:08 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=346",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Maiti:2011:IRO,
  author =       "Abhranil Maiti and Patrick Schaumont",
  title =        "Improved Ring Oscillator {PUF}: An {FPGA}-friendly
                 Secure Primitive",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "2",
  pages =        "375--397",
  month =        apr,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:08 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=375",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Baudet:2011:SOB,
  author =       "Mathieu Baudet and David Lubicz and Julien Micolod and
                 Andr{\'e} Tassiaux",
  title =        "On the Security of Oscillator-Based Random Number
                 Generators",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "2",
  pages =        "398--425",
  month =        apr,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:08 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=2&spage=398",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hell:2011:BSC,
  author =       "Martin Hell and Thomas Johansson",
  title =        "Breaking the Stream Ciphers {F-FCSR-H} and {F-FCSR-16}
                 in Real Time",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "3",
  pages =        "427--445",
  month =        jul,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:15 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=427",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Galbraith:2011:EFE,
  author =       "Steven D. Galbraith and Xibin Lin and Michael Scott",
  title =        "Endomorphisms for Faster Elliptic Curve Cryptography
                 on a Large Class of Curves",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "3",
  pages =        "446--469",
  month =        jul,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:15 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=446",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hofheinz:2011:PIR,
  author =       "Dennis Hofheinz",
  title =        "Possibility and Impossibility Results for Selective
                 Decommitments",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "3",
  pages =        "470--516",
  month =        jul,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:15 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=470",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kidron:2011:IRU,
  author =       "Dafna Kidron and Yehuda Lindell",
  title =        "Impossibility Results for Universal Composability in
                 Public-Key Models and with Fixed Inputs",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "3",
  pages =        "517--544",
  month =        jul,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:15 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=517",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Monnerat:2011:SUS,
  author =       "Jean Monnerat and Serge Vaudenay",
  title =        "Short Undeniable Signatures Based on Group
                 Homomorphisms",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "3",
  pages =        "545--587",
  month =        jul,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:15 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=545",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Liskov:2011:TBC,
  author =       "Moses Liskov and Ronald L. Rivest and David Wagner",
  title =        "Tweakable Block Ciphers",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "3",
  pages =        "588--613",
  month =        jul,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Sep 5 18:01:15 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=3&spage=588",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Garay:2011:RFC,
  author =       "Juan A. Garay and Philip MacKenzie and Manoj
                 Prabhakaran and Ke Yang",
  title =        "Resource Fairness and Composability of Cryptographic
                 Protocols",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "4",
  pages =        "615--658",
  month =        oct,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Dec 10 15:17:11 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=615",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Boneh:2011:ESI,
  author =       "Dan Boneh and Xavier Boyen",
  title =        "Efficient Selective Identity-Based Encryption Without
                 Random Oracles",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "4",
  pages =        "659--693",
  month =        oct,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Dec 10 15:17:11 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=659",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hohenberger:2011:SOR,
  author =       "Susan Hohenberger and Guy N. Rothblum and Abhi Shelat
                 and Vinod Vaikuntanathan",
  title =        "Securely Obfuscating Re-Encryption",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "4",
  pages =        "694--719",
  month =        oct,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Dec 10 15:17:11 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=694",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Barak:2011:SCA,
  author =       "Boaz Barak and Ran Canetti and Yehuda Lindell and
                 Rafael Pass and Tal Rabin",
  title =        "Secure Computation Without Authentication",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "4",
  pages =        "720--760",
  month =        oct,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Dec 10 15:17:11 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=720",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lindell:2011:AZK,
  author =       "Yehuda Lindell and Hila Zarosim",
  title =        "Adaptive Zero-Knowledge Proofs and Adaptively Secure
                 Oblivious Transfer",
  journal =      j-J-CRYPTOLOGY,
  volume =       "24",
  number =       "4",
  pages =        "761--799",
  month =        oct,
  year =         "2011",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Dec 10 15:17:11 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=24&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=24&issue=4&spage=761",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Jain:2012:RRP,
  author =       "Rahul Jain",
  title =        "Resource Requirements of Private Quantum Channels and
                 Consequences for Oblivious Remote State Preparation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "1",
  pages =        "1--13",
  month =        jan,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:14:18 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Gordon:2012:PFS,
  author =       "S. Dov Gordon and Jonathan Katz",
  title =        "Partial Fairness in Secure Two-Party Computation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "1",
  pages =        "14--40",
  month =        jan,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:14:18 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=14",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Katz:2012:WLR,
  author =       "Jonathan Katz",
  title =        "Which Languages Have 4-Round Zero-Knowledge Proofs?",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "1",
  pages =        "41--56",
  month =        jan,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:14:18 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=41",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Boldyreva:2012:SPS,
  author =       "Alexandra Boldyreva and Adriana Palacio and Bogdan
                 Warinschi",
  title =        "Secure Proxy Signature Schemes for Delegation
                 of Signing Rights",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "1",
  pages =        "57--115",
  month =        jan,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:14:18 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=57",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Pietrzak:2012:PRC,
  author =       "Krzysztof Pietrzak and Douglas Wikstr{\"o}m",
  title =        "Parallel Repetition of Computationally Sound Protocols
                 Revisited",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "1",
  pages =        "116--135",
  month =        jan,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:14:18 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=116",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Aerts:2012:PAK,
  author =       "Wim Aerts and Eli Biham and Dieter {De Moiti{\'e}} and
                 Elke {De Mulder} and Orr Dunkelman and Sebastiaan
                 Indesteege and Nathan Keller and Bart Preneel and Guy
                 A. E. Vandenbosch and Ingrid Verbauwhede",
  title =        "A Practical Attack on {KeeLoq}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "1",
  pages =        "136--157",
  month =        jan,
  year =         "2012",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-010-9091-9",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:14:18 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=136",
  abstract =     "KeeLoq is a lightweight block cipher with a 32-bit
                 block size and a 64-bit key. Despite its short key
                 size, it is used in remote keyless entry systems and
                 other wireless authentication applications. For
                 example, there are indications that authentication
                 protocols based on KeeLoq are used, or were used by
                 various car manufacturers in anti-theft mechanisms.
                 This paper presents a practical key recovery attack
                 against KeeLoq that requires $2^{16}$ known plaintexts
                 and has a time complexity of $2^{44.5}$ KeeLoq
                 encryptions. It is based on the principle of slide
                 attacks and a novel approach to meet-in-the-middle
                 attacks.\par

                 We investigated the way KeeLoq is intended to be used
                 in practice and conclude that our attack can be used to
                 subvert the security of real systems. In some scenarios
                 the adversary may even reveal the master secret used in
                 an entire class of devices from attacking a single
                 device. Our attack has been fully implemented. We have
                 built a device that can obtain the data required for
                 the attack in less than 100 minutes, and our software
                 experiments show that, given the data, the key can be
                 found in 7.8 days of calculations on 64 CPU cores.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Halevi:2012:SPH,
  author =       "Shai Halevi and Yael Tauman Kalai",
  title =        "Smooth Projective Hashing and Two-Message Oblivious
                 Transfer",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "1",
  pages =        "158--193",
  month =        jan,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:14:18 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=1&spage=158",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Cheon:2012:APR,
  author =       "Jung Hee Cheon and Jin Hong and Minkyu Kim",
  title =        "Accelerating {Pollard}'s Rho Algorithm on Finite
                 Fields",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "2",
  pages =        "195--242",
  month =        apr,
  year =         "2012",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-010-9093-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:11:13 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=195",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Ateniese:2012:PST,
  author =       "Giuseppe Ateniese and Alfredo {De Santis} and Anna
                 Lisa Ferrara and Barbara Masucci",
  title =        "Provably-Secure Time-Bound Hierarchical Key Assignment
                 Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "2",
  pages =        "243--270",
  month =        apr,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:11:13 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=243",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hirose:2012:SVM,
  author =       "Shoichi Hirose and Je Hong Park and Aaram Yun",
  title =        "A Simple Variant of the {Merkle--Damg{\aa}rd} Scheme
                 with a Permutation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "2",
  pages =        "271--309",
  month =        apr,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:11:13 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=271",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Roeder:2012:MVS,
  author =       "Tom Roeder and Rafael Pass and Fred B. Schneider",
  title =        "Multi-Verifier Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "2",
  pages =        "310--348",
  month =        apr,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:11:13 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=310",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Minder:2012:ETA,
  author =       "Lorenz Minder and Alistair Sinclair",
  title =        "The Extended $k$-tree Algorithm",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "2",
  pages =        "349--382",
  month =        apr,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Jan 17 10:11:13 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=2&spage=349",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hazay:2012:ESO,
  author =       "Carmit Hazay and Kobbi Nissim",
  title =        "Efficient Set Operations in the Presence of Malicious
                 Adversaries",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "3",
  pages =        "383--433",
  month =        jul,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Apr 6 18:10:11 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=383",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Farras:2012:IMS,
  author =       "Oriol Farr{\`a}s and Jaume Mart{\'\i}-Farr{\'e} and
                 Carles Padr{\'o}",
  title =        "Ideal Multipartite Secret Sharing Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "3",
  pages =        "434--463",
  month =        jul,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Apr 6 18:10:11 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=434",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Smyshlyaev:2012:PBB,
  author =       "Stanislav V. Smyshlyaev",
  title =        "Perfectly Balanced {Boolean} Functions and {Goli{\'c}
                 Conjecture}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "3",
  pages =        "464--483",
  month =        jul,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Apr 6 18:10:11 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=464",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hofheinz:2012:PHF,
  author =       "Dennis Hofheinz and Eike Kiltz",
  title =        "Programmable Hash Functions and Their Applications",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "3",
  pages =        "484--527",
  month =        jul,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Apr 6 18:10:11 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=484",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kawachi:2012:CIB,
  author =       "Akinori Kawachi and Takeshi Koshiba and Harumichi
                 Nishimura and Tomoyuki Yamakami",
  title =        "Computational Indistinguishability Between Quantum
                 States and Its Cryptographic Application",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "3",
  pages =        "528--555",
  month =        jul,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Apr 6 18:10:11 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=3&spage=528",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Desmedt:2012:GCA,
  author =       "Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and
                 Xiaoming Sun and Christophe Tartary and Huaxiong Wang
                 and Andrew Chi-Chih Yao",
  title =        "Graph Coloring Applied to Secure Computation in
                 Non-{Abelian} Groups",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "4",
  pages =        "557--600",
  month =        oct,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Oct 26 07:18:53 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=557",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Cash:2012:BTH,
  author =       "David Cash and Dennis Hofheinz and Eike Kiltz and
                 Chris Peikert",
  title =        "Bonsai Trees, or How to Delegate a Lattice Basis",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "4",
  pages =        "601--639",
  month =        oct,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Oct 26 07:18:53 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=601",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bellare:2012:LCH,
  author =       "M. Bellare and A. Boldyreva and L. Knudsen and C.
                 Namprempre",
  title =        "On-line Ciphers and the Hash-{CBC} Constructions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "4",
  pages =        "640--679",
  month =        oct,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Oct 26 07:18:53 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=640",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lindell:2012:STP,
  author =       "Yehuda Lindell and Benny Pinkas",
  title =        "Secure {Two--Party} Computation via Cut-and-Choose
                 Oblivious Transfer",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "4",
  pages =        "680--722",
  month =        oct,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Oct 26 07:18:53 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=680",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Camenisch:2012:BVS,
  author =       "Jan Camenisch and Susan Hohenberger and Michael
                 {\O}stergaard Pedersen",
  title =        "Batch Verification of Short Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "4",
  pages =        "723--747",
  month =        oct,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Oct 26 07:18:53 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=723",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Gauravaram:2012:SAR,
  author =       "Praveen Gauravaram and Lars R. Knudsen",
  title =        "Security Analysis of {Randomize-Hash-then-Sign}
                 Digital Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "25",
  number =       "4",
  pages =        "748--779",
  month =        oct,
  year =         "2012",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Fri Oct 26 07:18:53 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=25&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0933-2790&volume=25&issue=4&spage=748",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Pass:2013:PCP,
  author =       "Rafael Pass and Alon Rosen and Wei-Lung Dustin Tseng",
  title =        "Public-Coin Parallel Zero--Knowledge for {NP}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "1",
  pages =        "1--10",
  month =        jan,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-011-9110-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:26 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-011-9110-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Borghoff:2013:SSD,
  author =       "Julia Borghoff and Lars R. Knudsen and Gregor Leander
                 and S{\o}ren S. Thomsen",
  title =        "Slender-Set Differential Cryptanalysis",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "1",
  pages =        "11--38",
  month =        jan,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-011-9111-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:26 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-011-9111-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Freeman:2013:MCL,
  author =       "David Mandell Freeman and Oded Goldreich and Eike
                 Kiltz and Alon Rosen and Gil Segev",
  title =        "More Constructions of Lossy and Correlation-Secure
                 Trapdoor Functions",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "1",
  pages =        "39--74",
  month =        jan,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-011-9112-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:26 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-011-9112-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Ghodosi:2013:AUS,
  author =       "Hossein Ghodosi",
  title =        "Analysis of an Unconditionally Secure Distributed
                 Oblivious Transfer",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "1",
  pages =        "75--79",
  month =        jan,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-011-9113-2",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:26 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-011-9113-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Fujisaki:2013:SIA,
  author =       "Eiichiro Fujisaki and Tatsuaki Okamoto",
  title =        "Secure Integration of Asymmetric and Symmetric
                 Encryption Schemes",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "1",
  pages =        "80--101",
  month =        jan,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-011-9114-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:26 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-011-9114-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hofheinz:2013:PCC,
  author =       "Dennis Hofheinz and Eike Kiltz and Victor Shoup",
  title =        "Practical Chosen Ciphertext Secure Encryption from
                 Factoring",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "1",
  pages =        "102--118",
  month =        jan,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-011-9115-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:26 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-011-9115-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Joux:2013:ECD,
  author =       "Antoine Joux and Vanessa Vitse",
  title =        "Elliptic Curve Discrete Logarithm Problem over Small
                 Degree Extension Fields",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "1",
  pages =        "119--143",
  month =        jan,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-011-9116-z",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:26 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-011-9116-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bogdanov:2013:ILH,
  author =       "Andrej Bogdanov and Alon Rosen",
  title =        "Input Locality and Hardness Amplification",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "1",
  pages =        "144--171",
  month =        jan,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-011-9117-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:26 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-011-9117-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Isobe:2013:SKA,
  author =       "Takanori Isobe",
  title =        "A Single-Key Attack on the Full {GOST} Block Cipher",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "1",
  pages =        "172--189",
  month =        jan,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9118-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:26 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9118-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Katz:2013:PES,
  author =       "Jonathan Katz and Amit Sahai and Brent Waters",
  title =        "Predicate Encryption Supporting Disjunctions,
                 Polynomial Equations, and Inner Products",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "2",
  pages =        "191--224",
  month =        apr,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9119-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:27 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9119-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Jager:2013:ACA,
  author =       "Tibor Jager and J{\"o}rg Schwenk",
  title =        "On the Analysis of Cryptographic Assumptions in the
                 Generic Ring Model",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "2",
  pages =        "225--245",
  month =        apr,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9120-y",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:27 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9120-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Coron:2013:NBC,
  author =       "Jean-S{\'e}bastien Coron and Alexey Kirichenko and
                 Mehdi Tibouchi",
  title =        "A Note on the {Bivariate Coppersmith Theorem}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "2",
  pages =        "246--250",
  month =        apr,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9121-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:27 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9121-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Chase:2013:MCA,
  author =       "Melissa Chase and Alexander Healy and Anna Lysyanskaya
                 and Tal Malkin and Leonid Reyzin",
  title =        "Mercurial Commitments with Applications to
                 Zero-Knowledge Sets",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "2",
  pages =        "251--279",
  month =        apr,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9122-9",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:27 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9122-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Boyar:2013:LMT,
  author =       "Joan Boyar and Philip Matthews and Ren{\'e} Peralta",
  title =        "Logic Minimization Techniques with Applications to
                 Cryptology",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "2",
  pages =        "280--312",
  month =        apr,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9124-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:27 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9124-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Aumasson:2013:QLH,
  author =       "Jean-Philippe Aumasson and Luca Henzen and Willi Meier
                 and Mar{\'\i}a Naya-Plasencia",
  title =        "{{\sc Quark}}: a Lightweight Hash",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "2",
  pages =        "313--339",
  month =        apr,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9125-6",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:27 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9125-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lu:2013:SAS,
  author =       "Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav
                 Shacham and Brent Waters",
  title =        "Sequential Aggregate Signatures, Multisignatures, and
                 Verifiably Encrypted Signatures Without Random
                 Oracles",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "2",
  pages =        "340--373",
  month =        apr,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9126-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Tue Apr 2 12:31:27 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9126-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hofheinz:2013:PRC,
  author =       "Dennis Hofheinz and Dominique Unruh and J{\"o}rn
                 M{\"u}ller-Quade",
  title =        "Polynomial Runtime and Composability",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "3",
  pages =        "375--441",
  month =        jul,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9127-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Jun 6 07:19:15 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9127-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Shacham:2013:CPR,
  author =       "Hovav Shacham and Brent Waters",
  title =        "Compact Proofs of Retrievability",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "3",
  pages =        "442--483",
  month =        jul,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9129-2",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Jun 6 07:19:15 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9129-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Goldreich:2013:ETP,
  author =       "Oded Goldreich and Ron D. Rothblum",
  title =        "Enhancements of Trapdoor Permutations",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "3",
  pages =        "484--512",
  month =        jul,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9131-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Jun 6 07:19:15 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9131-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Boyle:2013:FLR,
  author =       "Elette Boyle and Gil Segev and Daniel Wichs",
  title =        "Fully Leakage-Resilient Signatures",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "3",
  pages =        "513--558",
  month =        jul,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9136-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Jun 6 07:19:15 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=3;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9136-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hong:2013:CCT,
  author =       "Jin Hong and Sunghwan Moon",
  title =        "A Comparison of Cryptanalytic Tradeoff Algorithms",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "4",
  pages =        "559--637",
  month =        oct,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9128-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:31 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  note =         "See erratum \cite{Hong:2014:EBC}.",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9128-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Lindell:2013:NCR,
  author =       "Yehuda Lindell",
  title =        "A Note on Constant-Round Zero-Knowledge Proofs of
                 Knowledge",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "4",
  pages =        "638--654",
  month =        oct,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9132-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:31 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9132-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{vanDijk:2013:FGS,
  author =       "Marten van Dijk and Ari Juels and Alina Oprea and
                 Ronald L. Rivest",
  title =        "{FlipIt}: The Game of ``Stealthy Takeover''",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "4",
  pages =        "655--713",
  month =        oct,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9134-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:31 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9134-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Katz:2013:ROP,
  author =       "Jonathan Katz and Vinod Vaikuntanathan",
  title =        "Round-Optimal Password-Based Authenticated Key
                 Exchange",
  journal =      j-J-CRYPTOLOGY,
  volume =       "26",
  number =       "4",
  pages =        "714--743",
  month =        oct,
  year =         "2013",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9133-6",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:31 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=26&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9133-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Stankovski:2014:ESR,
  author =       "Paul Stankovski and Martin Hell and Thomas Johansson",
  title =        "An Efficient State Recovery Attack on the {X-FCSR}
                 Family of Stream Ciphers",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "1",
  pages =        "1--22",
  month =        jan,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9130-9",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:32 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9130-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Kiayias:2014:OTS,
  author =       "Aggelos Kiayias and Yona Raekow and Alexander
                 Russell",
  title =        "A One-Time Stegosystem and Applications to Efficient
                 Covert Communication",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "1",
  pages =        "23--44",
  month =        jan,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9135-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:32 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9135-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Pass:2014:CZK,
  author =       "Rafael Pass and Wei-Lung {Dustin Tseng}",
  title =        "Concurrent Zero Knowledge, Revisited",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "1",
  pages =        "45--66",
  month =        jan,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9137-2",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:32 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9137-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{SenGupta:2014:NRS,
  author =       "Sourav {Sen Gupta} and Subhamoy Maitra and Goutam Paul
                 and Santanu Sarkar",
  title =        "(Non-)Random Sequences from (Non-)Random Permutations
                 --- Analysis of {RC4} Stream Cipher",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "1",
  pages =        "67--108",
  month =        jan,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9138-1",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:32 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9138-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Haitner:2014:NIH,
  author =       "Iftach Haitner and Omer Reingold",
  title =        "A New Interactive Hashing Theorem",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "1",
  pages =        "109--138",
  month =        jan,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9139-0",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:32 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9139-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Birkett:2014:SMP,
  author =       "James Birkett and Alexander W. Dent",
  title =        "Security Models and Proof Strategies for
                 Plaintext-Aware Encryption",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "1",
  pages =        "139--180",
  month =        jan,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9141-6",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:32 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9141-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hong:2014:EBC,
  author =       "Jin Hong and Sunghwan Moon",
  title =        "Erratum to: {{\booktitle{A Comparison of Cryptanalytic
                 Tradeoff Algorithms}}}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "1",
  pages =        "181--181",
  month =        jan,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9140-7",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Thu Feb 27 17:08:32 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=1;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  note =         "See \cite{Hong:2013:CCT}.",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9140-7;
                 http://link.springer.com/content/pdf/10.1007/s00145-012-9140-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Dinur:2014:IPA,
  author =       "Itai Dinur and Orr Dunkelman and Adi Shamir",
  title =        "Improved Practical Attacks on Round-Reduced {Keccak}",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "2",
  pages =        "183--209",
  month =        apr,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9142-5",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 19 14:41:17 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9142-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
  keywords =     "collision near-collision; cryptanalysis; Keccak;
                 practical attack; SHA-3",
  remark =       "The authors exhibit hash-function collisions in
                 up-to-4-round Keccak-224 and Keccak-256 algorithms, but
                 observe that ``full Keccak has 24 rounds, [so] our
                 attack does not threaten the security of the [NIST
                 SHA-3] hash function.",
}

@Article{Brakerski:2014:BSD,
  author =       "Zvika Brakerski and Gil Segev",
  title =        "Better Security for Deterministic Public-Key
                 Encryption: The Auxiliary-Input Setting",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "2",
  pages =        "210--247",
  month =        apr,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9143-4",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 19 14:41:17 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9143-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Longa:2014:FDG,
  author =       "Patrick Longa and Francesco Sica",
  title =        "Four-Dimensional {Gallant--Lambert--Vanstone} Scalar
                 Multiplication",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "2",
  pages =        "248--283",
  month =        apr,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-012-9144-3",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 19 14:41:17 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-012-9144-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Cramer:2014:ACZ,
  author =       "Ronald Cramer and Ivan Damg{\aa}rd and Marcel Keller",
  title =        "On the Amortized Complexity of Zero-Knowledge
                 Protocols",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "2",
  pages =        "284--316",
  month =        apr,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-013-9145-x",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 19 14:41:17 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-013-9145-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Bitansky:2014:SSC,
  author =       "Nir Bitansky and Ran Canetti",
  title =        "On Strong Simulation and Composable Point
                 Obfuscation",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "2",
  pages =        "317--357",
  month =        apr,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-013-9146-9",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 19 14:41:17 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-013-9146-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}

@Article{Hazay:2014:CSP,
  author =       "Carmit Hazay and Tomas Toft",
  title =        "Computationally Secure Pattern Matching in the
                 Presence of Malicious Adversaries",
  journal =      j-J-CRYPTOLOGY,
  volume =       "27",
  number =       "2",
  pages =        "358--395",
  month =        apr,
  year =         "2014",
  CODEN =        "JOCREQ",
  DOI =          "http://dx.doi.org/10.1007/s00145-013-9147-8",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Sat Apr 19 14:41:17 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0933-2790&volume=27&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
                 http://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s00145-013-9147-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
}