3 %%%--------------------------------------------------------------------------
8 \ifx\url\undefined\let\url\texttt\fi
9 \ifx\msgid\undefined\let\msgid\texttt\fi
10 \let\mdwxxthebibliography\thebibliography
11 \def\thebibliography
{\mdwxxbibhook\mdwxxthebibliography
}
13 \def\biburl
{\bgroup\catcode`\#
12\relax\biburlx
}
14 \def\biburlx#
1{\let\biburlsep\empty\biburlxi#
1;;\done\egroup
}
15 \def\biburlxi#
1;{\def\temp
{#
1}\ifx\temp\empty\expandafter\biburlxiii\else
16 \biburlxii#
1,,\done\let\biburlxafter\biburlxi\expandafter\biburlxmunch\fi
}
17 \def\biburlxii#
1,{\def\temp
{#
1}\ifx\temp\empty\expandafter\biburlxiii\else
18 \biburlsep\mdwxxurl
{#
1}\def\biburlsep
{, }\let\biburlxafter\biburlxii
19 \expandafter\biburlxmunch\fi
}
20 \def\biburlxiii#
1\done
{}
21 \def\biburlxmunch
{\futurelet\next\biburlxmunchi
}
22 \def\biburlxmunchi
{\expandafter\ifx\space\next\expandafter\biburlxmunchii
23 \else\expandafter\biburlxafter\fi
}
24 \expandafter\def\expandafter\biburlxmunchii\space
{\biburlxmunch
}
25 \def\mdwxxbibhook
{\let\mdwxxurl\url\let\url\biburl
}
29 @String
{j
-J
-CRYPTOLOGY
= "Journal of Cryptology
: the
journal of the International Association for Cryptologic Research"
}
31 %%%--------------------------------------------------------------------------
32 %%% The main bibliography.
34 @InProceedings
{abdalla
-2001:dhies
,
35 author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway"
,
36 title = "
{DHIES
}: An Encryption Scheme Based on the
37 {Diffie
--Hellman
} Problem"
,
39 crossref
= "Naccache
:2001:TCC"
,
40 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/dhies.html"
43 @InProceedings
{alexander
-goldberg
-2007:improved
-user
-authn
-otr
,
44 author = "Chris Alexander and Ian Goldberg"
,
45 title = "Improved user authentication in off
-the
-record messaging"
,
49 ee
= "http
://doi.acm.org
/10.1145/1314333.1314340"
,
50 url
= "http
://www.cypherpunks.ca
/~iang
/pubs
/impauth.pdf"
,
51 crossref
= "DBLP
:conf
/wpes
/2007"
,
52 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
55 @InProceedings
{bellare
-1994:security
-cbc
,
56 author = "Mihir Bellare and Joe Kilian and Phillip Rogaway"
,
57 title = "The Security of Cipher Block Chaining"
,
58 booktitle = "
{Advances in cryptology
, {CRYPTO '
94}: 14th annual
59 international cryptology conference
, Santa Barbara
,
60 California
, {USA
}, August
21--25, 1994: proceedings
}"
,
62 editor = "Yvo G. Desmedt"
,
64 series = "Lecture Notes in Computer Science"
,
66 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
67 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
69 isbn
= "
3-540-58333-5 (Berlin
), 0-387-58333-5 (New York
)"
,
70 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
72 "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/0839/08390341.htm"
75 @InProceedings
{bellare
-1995:xor
-macs
,
76 author = "Mihir Bellare and Roch Gu
{\'e
}rin and Phillip Rogaway"
,
77 title = "
{XOR MACs
}: New methods for message authentication using
78 finite pseudorandom functions"
,
79 booktitle = "
{Advances in cryptology
, {CRYPTO '
95}: 15th Annual
80 International Cryptology Conference
, Santa Barbara
,
81 California
, {USA
}, August
27--31, 1995: proceedings
}"
,
83 editor = "Don Coppersmith"
,
85 series = "Lecture Notes in Computer Science"
,
87 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
88 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
89 note = "Sponsored by the International Association for Cryptologic
90 Research
(IACR
), in cooperation with the IEEE Computer
91 Society Technical Committee on Security and Privacy."
,
93 isbn
= "
3-540-60221-6 (Berlin
)"
,
94 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
96 "http
://link.springer
-ny.com
/link
/service
/series/0558/tocs
/t0963.htm"
99 @InProceedings
{bellare
-1996:hmac
,
100 author = "Mihir Bellare and Ran Canetti and Hugo Krawczyk"
,
101 title = "Keying Hash Functions for Message Authentication"
,
102 booktitle = "
{Advances in cryptology
, {CRYPTO '
96}: 16th annual
103 international cryptology conference
, Santa Barbara
,
104 California
, {USA
}, August
18--22, 1996: proceedings
}"
,
106 editor = "Neal Koblitz"
,
108 series = "Lecture Notes in Computer Science"
,
110 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
111 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
112 note = "Sponsored by the International Association for Cryptologic
113 Research
(IACR
), in cooperation with the IEEE Computer
114 Society Technical Committee on Security and Privacy and
115 the Computer Science Department of the University of
116 California at Santa Barbara
(UCSB
)."
,
117 annote = "``Sponsored by the International Association for
118 Cryptologic Research
(IACR
), in cooperation with the IEEE
119 Computer Society Technical Committee on Security and
120 Privacy and the Computer Science Department of the
121 University of California at Santa Barbara
(UCSB
)''"
,
123 isbn
= "
3-540-61512-1"
,
124 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
125 url
= "http
://www.research.ibm.com
/security
/"
128 @InProceedings
{bellare
-1997:concrete
-symmetric
,
129 author = "M. Bellare and A. Desai and E. Jokipii and P. Rogaway"
,
130 title = "A concrete security treatment of symmetric encryption"
,
131 booktitle = "
38th Annual Symposium on Foundations of Computer Science
:
132 October
20--22, 1997, Miami Beach
, Florida"
,
136 address = "
1109 Spring Street
, Suite
300, Silver Spring
, MD
20910,
138 publisher = "IEEE Computer Society Press"
,
139 note = "IEEE catalog
number 97CB36150. IEEE Computer Society Press
140 order
number PR08197."
,
141 key = "IEEE
-FOCS'
97"
,
142 isbn
= "
0-8186-8197-7 (paperback
), 0-8186-8198-5 (casebound
),
143 0-8186-8199-3 (microfiche
)"
,
147 @InProceedings
{bellare
-1998:modular
-key-exchange
,
148 author = "Mihir Bellare and Ran Canetti and Hugo Krawczyk"
,
149 title = "A modular approach to the design and analysis of
150 authentication and
key exchange protocols
(extended
152 booktitle = "Proceedings of the thirtieth annual
{ACM
} Symposium on
153 Theory of Computing
: Dallas
, Texas
, May
23--26, 1998"
,
157 address = "New York
, NY
, USA"
,
158 publisher = "ACM Press"
,
159 note = "ACM order
number 508980."
,
160 isbn
= "
0-89791-962-9"
,
162 "http
://www.acm.org
/pubs
/citations
/proceedings
/stoc
/276698/p419
-bellare
/"
165 @Article
{bellare
-1998:pub
-enc
-notions
,
166 author = "Mihir Bellare and Anand Desai and David Pointcheval and
168 title = "Relations Among Notions of Security for Public
-Key
170 journal = "Lecture Notes in Computer Science"
,
174 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
176 "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/1462/14620026.htm"
179 @Article
{bellare
-1999:practice
-oriented
-provable
-security
,
180 author = "M. Bellare"
,
181 title = "Practice
-Oriented Provable Security"
,
182 journal = "Lecture Notes in Computer Science"
,
186 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
189 @InProceedings
{bellare
-2004:eax
,
190 author = "Mihir Bellare and Phillip Rogaway and David Wagner"
,
191 title = "The
{EAX
} Mode of Operation"
,
193 editor = "Bimal K. Roy and Willi Meier"
,
195 series = "Lecture Notes in Computer Science"
,
197 publisher = "Springer"
,
198 bibdate
= "
2004-07-29"
,
200 http
://dblp.uni
-trier.de
/db
/conf
/fse
/fse2004.html#BellareRW04"
,
201 booktitle = "Fast Software Encryption
, 11th International Workshop
,
202 {FSE
} 2004, Delhi
, India
, February
5-7, 2004, Revised
204 isbn
= "
3-540-22171-9"
,
205 url
= "http
://www.cs.berkeley.edu
/~daw
/papers
/eax
-fse04.ps"
208 @InCollection
{bellare
-namprempre
-2000:authn
-enc
-notions
,
209 author = "Mihir Bellare and Chanathip Namprempre"
,
210 title = "Authenticated Encryption
: Relations among Notions and
211 Analysis of the Generic Composition Paradigm"
,
212 booktitle = "Advances in cryptology
---ASIACRYPT
2000 (Kyoto
)"
,
213 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
216 series = "Lecture Notes in Comput. Sci."
,
218 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
220 "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/1976/19760531.htm"
223 @InProceedings
{bellare
-rogaway
-1993:random
-oracles
,
224 author = "Mihir Bellare and Phillip Rogaway"
,
225 title = "Random oracles are practical"
,
226 booktitle = "Proceedings of the First Annual Conference on Computer and
227 Communications Security"
,
230 organization = "
{ACM
}"
,
231 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/ro.html"
234 @InProceedings
{bellare
-rogaway
-1994:entity
-authn
-key-distrib
,
235 author = "Mihir Bellare and Phillip Rogaway"
,
236 title = "Entity Authentication and Key Distribution"
,
237 booktitle = "
{Advances in cryptology
, {CRYPTO '
94}: 14th annual
238 international cryptology conference
, Santa Barbara
,
239 California
, {USA
}, August
21--25, 1994: proceedings
}"
,
241 editor = "Yvo G. Desmedt"
,
243 series = "Lecture Notes in Computer Science"
,
245 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
246 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
248 isbn
= "
3-540-58333-5 (Berlin
), 0-387-58333-5 (New York
)"
,
249 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
250 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/0773/07730232.htm"
253 @InProceedings
{bellare
-rogaway
-1995:oaep
,
254 author = "M. Bellare and P. Rogaway"
,
255 title = "Optimal asymmetric encryption
: How to Encrypt with
{RSA
}"
,
256 booktitle = "Advances in cryptology
--- {EUROCRYPT
} '
94: Workshop on
257 the Theory and Application of Cryptographic Techniques
,
258 Perugia
, Italy
, May
9--12, 1994: proceedings"
,
260 editor = "Alfredo
{De Santis
}"
,
262 series = "Lecture Notes in Computer Science"
,
264 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
265 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
266 isbn
= "
3-540-60176-7"
,
267 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
269 "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/0950/09500092.htm"
272 @InProceedings
{bellare
-rogaway
-1995:session
-key-distrib
,
273 author = "Mihir Bellare and Phillip Rogaway"
,
274 title = "Provably secure session
key distribution
: the three party
276 booktitle = "Proceedings of the twenty
-seventh annual
{ACM
} Symposium
277 on Theory of Computing
: Las Vegas
, Nevada
, May
29--June
1,
282 address = "New York
, NY
, USA"
,
283 publisher = "ACM Press"
,
284 note = "ACM order no.
508950."
,
285 isbn
= "
0-89791-718-9"
,
286 url
= "http
://www.acm.org
/pubs
/citations
/proceedings
/stoc
/225058/p57
-bellare
/"
289 @Article
{bellare
-rogaway
-1996:exact
-security
-sigs
,
290 author = "Mihir Bellare and Phillip Rogaway"
,
291 title = "The exact security of digital signatures
--- how to sign
292 with
{RSA
} and
{Rabin
}"
,
293 journal = "Lecture Notes in Computer Science"
,
297 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
298 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/1070/10700399.htm"
301 @Misc
{bellare
-rogaway
-2004:triple
-enc
-eprint
,
302 author = "Mihir Bellare and Phillip Rogaway"
,
303 title = "Code
-Based Game
-Playing Proofs and the Security of Triple
305 howpublished = "Cryptology ePrint Archive
, Report
2004/331"
,
307 url
= "http
://eprint.iacr.org
/2004/331"
310 @InProceedings
{bellare
-rogaway
-2006:triple
-enc
,
311 author = "Mihir Bellare and Phillip Rogaway"
,
312 title = "The Security of Triple Encryption and a Framework for
313 Code
-Based Game
-Playing Proofs"
,
314 booktitle = "Advances in Cryptology
- {EUROCRYPT
} 2006, 25th Annual
315 International Conference on the Theory and Applications of
316 Cryptographic Techniques
, St. Petersburg
, Russia
, May
28 -
317 June
1, 2006, Proceedings"
,
319 editor = "Serge Vaudenay"
,
321 series = "Lecture Notes in Computer Science"
,
323 publisher = "Springer"
,
324 note = "Proceedings version of
325 \cite
{bellare
-rogaway
-2004:triple
-enc
-eprint
}"
,
326 bibdate
= "
2006-07-05"
,
327 bibsource
= "DBLP
, http
://dblp.uni
-trier.de
/db
/conf
/eurocrypt
/eurocrypt2006.html#BellareR06"
,
328 isbn
= "
3-540-34546-9"
331 @InProceedings
{bernstein
-2005:poly1305
,
332 author = "Daniel J. Bernstein"
,
333 title = "The Poly1305
-AES Message
-Authentication Code"
,
334 booktitle = "Fast Software Encryption
: 12th International Workshop
,
335 {FSE
} 2005, Paris
, France
, February
21-23, 2005, Revised
339 crossref
= "DBLP
:conf
/fse
/2005"
,
340 url
= "https
://doi.org
/10.1007/11502760_3"
,
341 doi
= "
10.1007/11502760_3"
,
342 timestamp
= "Tue
, 30 May
2017 16:36:53 +0200"
,
343 biburl
= "http
://dblp.uni
-trier.de
/rec
/bib
/conf
/fse
/Bernstein05"
,
344 bibsource
= "dblp computer science bibliography
, http
://dblp.org"
347 @Misc
{bernstein
-2005:salsa20
,
348 author = "Daniel J. Bernstein"
,
349 title = "
{Salsa20
} Specification"
,
350 howpublished = "Submission to the ECRYPT Stream Cipher project
(eSTREAM
)"
,
353 url
= "https
://cr.yp.to
/snuffle
/spec.pdf"
356 @InProceedings
{bernstein
-2006:curve25519
,
357 author = "Daniel J. Bernstein"
,
358 title = "Curve25519
: New Diffie
-Hellman Speed Records"
,
359 booktitle = "Public Key Cryptography
- {PKC
} 2006, 9th International
360 Conference on Theory and Practice of Public
-Key
361 Cryptography
, New York
, NY
, USA
, April
24-26, 2006,
365 crossref
= "DBLP
:conf
/pkc
/2006"
,
366 url
= "https
://cr.yp.to
/papers.html#curve25519"
,
367 doi
= "
10.1007/11745853_14"
,
368 timestamp
= "Tue
, 30 May
2017 16:36:52 +0200"
,
369 biburl
= "http
://dblp.uni
-trier.de
/rec
/bib
/conf
/pkc
/Bernstein06"
,
370 bibsource
= "dblp computer science bibliography
, http
://dblp.org"
373 @Article
{blake
-wilson
-1997:key-agreement
,
374 author = "S. Blake
-Wilson and D. Johnson and A. Menezes"
,
375 title = "Key Agreement Protocols and Their Security Analysis"
,
376 journal = "Lecture Notes in Computer Science"
,
380 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
383 @Article
{blake
-wilson
-menezes
-1998:asymm
-key-transport
,
384 author = "S. Blake
-Wilson and A. Menezes"
,
385 title = "Entity Authentication and Authenticated Key Transport
386 Protocols Employing Asymmetric Techniques"
,
387 journal = "Lecture Notes in Computer Science"
,
391 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
394 @Article
{boneh
-1998:ddh
,
396 title = "The Decision
{Diffie
--Hellman
} Problem"
,
397 journal = "Lecture Notes in Computer Science"
,
401 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
402 url
= "http
://theory.stanford.edu
/~dabo
/papers
/DDH.ps.gz"
405 @Article
{boneh
-franklin
-2003:ibe
-weil
-pairing
,
406 author = "Dan Boneh and Matthew Franklin"
,
407 title = "Identity
-Based Encryption from the
{Weil
} Pairing"
,
408 journal = "SIAM Journal on Computing"
,
414 doi
= "https
://doi.org
/10.1137/S0097539701398521"
,
415 issn
= "
0097-5397 (print
), 1095-7111 (electronic
)"
,
416 url
= "http
://epubs.siam.org
/sam
-bin
/dbq
/article
/39852"
419 @InProceedings
{borisov
-2004:off
-the
-record
,
420 author = "Nikita Borisov and Ian Goldberg and Eric A. Brewer"
,
421 title = "Off
-the
-record communication
, or
, why not to use PGP"
,
425 ee
= "http
://doi.acm.org
/10.1145/1029179.1029200"
,
426 url
= "http
://www.cypherpunks.ca
/otr
/otr
-wpes.pdf"
,
427 crossref
= "DBLP
:conf
/wpes
/2004"
,
428 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
431 @InProceedings
{brassard
-crepeau
-1989:sorting
-zero
-knowledge
,
432 author = "Gilles Brassard and Claude Crepeau"
,
433 title = "Sorting out Zero
-Knowledge"
,
434 booktitle = "Theory and Application of Cryptographic Techniques"
,
437 url
= "http
://citeseer.nj.nec.com
/brassard90sorting.html"
440 @TechReport
{burrows
-1989:logic
-authn
,
441 author = "Michael Burrows and Martin Abadi and Roger Needham"
,
442 title = "A Logic of Authentication"
,
443 institution = "Digital Equipment Corporation
, Systems Research Centre"
,
448 abstract = "Questions of belief are essential in analyzing protocols
449 for authentication in distributed computing systems. In
450 this paper we motivate
, set out
, and exemplify a logic
451 specifically designed for this analysis
; we show how
452 various protocols differ subtly with respect to the
453 required initial assumptions of the participants and their
454 final beliefs. Our formalism has enabled us to isolate and
455 express these differences with a precision that was not
456 previously possible. It has drawn attention to features of
457 protocols of which we and their authors were previously
458 unaware
, and allowed us to suggest improvements to the
459 protocols. The reasoning about some protocols has been
460 mechanically verified. This paper starts with an informal
461 account of the problem
, goes on to explain the formalism
462 to be used
, and gives examples of its application to
463 protocols from the literature
, both with conventional
464 shared
-key cryptography and with public
-key
465 cryptography. Some of the examples are chosen because of
466 their practical importance
, while others serve to
467 illustrate subtle points of the logic and to explain how
468 we use it. We discuss extensions of the logic motivated by
469 actual practice
-- for example
, in order to account for
470 the use of hash functions in signatures. The final
471 sections contain a formal semantics of the logic and some
475 @Article
{canetti
-2000:security
-and
-composition
,
476 author = "Ran Canetti"
,
477 title = "Security and Composition of Multiparty Cryptographic
479 journal = j
-J
-CRYPTOLOGY
,
485 issn
= "
0933-2790 (print
), 1432-1378 (electronic
)"
,
486 issn
-l
= "
0933-2790"
,
487 bibdate
= "Mon Oct
9 17:48:14 MDT
2000"
,
488 bibsource
= "http
://link.springer.de
/link
/service
/journals
/00145/tocs
/t0013001.html
;
489 http
://www.math.utah.edu
/pub
/tex
/bib
/jcryptology.bib"
,
490 url
= "http
://link.springer.de
/link
/service
/journals
/00145/bibs
/0013001/00130143.html"
,
491 acknowledgement
= ack
-nhfb
,
492 journal-url
= "http
://link.springer.com
/journal/145"
495 @InProceedings
{canetti
-2001:uc
-security
,
496 author = "R. Canetti"
,
497 title = "
{Universally Composable
} security
: a new paradigm for
498 cryptographic protocols"
,
499 booktitle = "
{42nd IEEE Symposium on Foundations of Computer Science
:
500 proceedings
: October
14--17, 2001, Las Vegas
, Nevada
,
505 address = "
1109 Spring Street
, Suite
300, Silver Spring
, MD
20910,
507 publisher = "IEEE Computer Society Press"
,
508 isbn
= "
0-7695-1390-5, 0-7695-1391-3 (case
), 0-7695-1392-1
513 @TechReport
{canetti
-2001:uc
-security
-eprint
,
514 author = "Ran Canetti"
,
515 title = "
{Universally Composable
} Security
: a New Paradigm for
516 Cryptographic Protocols"
,
517 institution = "Cryptology
{ePrint
} Archive"
,
522 note = "Extended Abstract appeared in proceedings of the
42nd
523 Symposium on Foundations of Computer Science
(FOCS
), 2001"
,
524 annote = "Revised version of
525 \cite
{canetti
-2000:security
-and
-composition
}."
,
527 url
= "http
://eprint.iacr.org
/2000/067"
,
528 abstract = "We propose a new paradigm for defining security of
529 cryptographic protocols
, called
{\sf universally
530 composable security.
} The salient property of universally
531 composable definitions of security is that they guarantee
532 security even when a secure protocol is composed with an
533 arbitrary set of protocols
, or more generally when the
534 protocol is used as a component of an arbitrary
535 system. This is an essential property for maintaining
536 security of cryptographic protocols in complex and
537 unpredictable environments such as the Internet. In
538 particular
, universally composable definitions guarantee
539 security even when an unbounded
number of protocol
540 instances are executed concurrently in an adversarially
541 controlled manner
, they guarantee non
-malleability with
542 respect to arbitrary protocols
, and more. We show how to
543 formulate universally composable definitions of security
544 for practically any cryptographic task. Furthermore
, we
545 demonstrate that practically any such definition can be
546 realized using known general techniques
, as long as only a
547 minority of the participants are corrupted. We then
548 proceed to formulate universally composable definitions of
549 a wide array of cryptographic tasks
, including
550 authenticated and secure communication
, key-exchange
,
551 public
-key encryption
, signature
, commitment
, oblivious
552 transfer
, zero
-knowledge
, and more. We also make initial
553 steps towards studying the realizability of the proposed
554 definitions in other natural settings."
,
555 keywords = "foundations
/ cryptographic protocols
, security analysis
556 of protocols
, concurrent composition"
,
557 added
-at
= "Wed Oct
17 16:02:37 2001"
560 @Article
{canetti
-2004:rand
-oracle
-revisit
,
561 author = "Ran Canetti and Oded Goldreich and Shai Halevi"
,
562 title = "The random oracle methodology
, revisited"
,
563 journal = "Journal of the ACM"
,
569 issn
= "
0004-5411 (print
), 1557-735X
(electronic
)"
572 @Article
{canetti
-krawczyk
-2001:secure
-channels
,
573 author = "Ran Canetti and Hugo Krawczyk"
,
574 title = "Analysis of Key
-Exchange Protocols and Their Use for
575 Building Secure Channels"
,
576 journal = "Lecture Notes in Computer Science"
,
580 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
581 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/2045/20450453.htm"
584 @Misc
{canetti
-krawczyk
-2001:secure
-channels
-eprint
,
585 author = "Ran Canetti and Hugo Krawczyk"
,
586 title = "Analysis of Key
-Exchange Protocols and Their Use for
587 Building Secure Channels"
,
588 howpublished = "Cryptology ePrint Archive
, Report
2001/040"
,
590 url
= "http
://eprint.iacr.org
/2001/040"
593 @Article
{canetti
-krawczyk
-2002:uc
-key-exchange
,
594 author = "Ran Canetti and Hugo Krawczyk"
,
595 title = "Universally Composable Notions of Key Exchange and Secure
597 journal = "Lecture Notes in Computer Science"
,
601 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
602 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/2332/23320337.htm"
605 @Misc
{certicom
-2000:sec1
,
606 author = "
{Certicom Research
}"
,
607 title = "Standards for Efficient Cryptography
, {SEC
} 1: {E
}lliptic
608 curve cryptography
, Version
1.0"
,
610 url
= "http
://www.secg.org
/download
/aid
-385/sec1_final.pdf"
613 @PhdThesis
{daemen
-1995:cipher
-hash
-design
,
614 author = "Joan Daemen"
,
615 title = "Cipher and hash function design strategies based on linear
616 and differential cryptanalysis"
,
617 school = "K. U. Leuven"
,
621 @Manual
{dworkin
-2010:cbc
-ciphertext
-stealing
,
622 title = "Recommendation for Block Cipher Modes of Operation
: Three
623 Variants of Ciphertext Stealing for CBC Mode"
,
624 author = "Morris Dworkin"
,
625 organization = pub
-NIST
,
626 address = pub
-NIST
:adr
,
629 note = "Addendum to NIST Special Publication
800-38A"
,
631 url
= "http
://nvlpubs.nist.gov
/nistpubs
/Legacy
/SP
/nistspecialpublication800
-38a
-add.pdf"
634 @InProceedings
{elgamal
-1985:dlog
-enc
-sign
,
635 author = "Taher ElGamal"
,
636 title = "A Public Key Cryptosystem and a Signature Scheme Based on
637 Discrete Logarithms"
,
638 booktitle = "
{Advances in Cryptology
: Proceedings of CRYPTO
84}"
,
640 editor = "George Robert Blakley and David Chaum"
,
642 series = "Lecture Notes in Computer Science"
,
644 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
645 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
646 note = "CRYPTO
84: a Workshop on the Theory and Application of
647 Cryptographic Techniques
, held at the University of
648 California
, Santa Barbara
, August
19--22, 1984, sponsored
649 by the International Association for Cryptologic
651 doi
= "https
://doi.org
/10.1007/3-540-39568-7"
,
652 isbn
= "
0-387-15658-5; 3-540-39568-7"
,
653 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
655 "http
://www.springerlink.com
/openurl.asp?genre
=article
&issn
=????
&volume=0&issue
=0&spage
=10"
658 @Misc
{ellis
-1997:non
-secret
-enc
,
659 author = "James Ellis"
,
660 title = "The Story of Non
-Secret Encryption"
,
661 howpublished = "CESG internal document"
,
664 note = "Released internally in
1987."
,
665 url
= "http
://www.jya.com
/ellisdoc.htm"
668 @Misc
{ferguson
-2005:gcm
-authn
-weakness
,
669 author = "Niels Ferguson"
,
670 title = "Authentication Weaknesses in
{GCM
}"
,
673 note = "Public comment to NIST"
,
674 url
= "http
://csrc.nist.gov
/groups
/ST
/toolkit
/BCM
/documents
/comments
/CWC
-GCM
/Ferguson2.pdf"
677 @Misc
{fisher
-2000:storin
-usenet
,
678 author = "Matthew Fisher"
,
679 title = "Re
: Yet another block cipher
: {Storin
}"
,
680 howpublished = "Usenet article in
{\texttt
{sci.crypt
}}"
,
682 note = "Message
-id
{\msgid
{<8gjctn\$
9ct\$
1@nnrp1.deja.com
>}}"
685 @Misc
{goldwasser
-bellare
-1999:lecture
-notes
-crypto
,
686 author = "Shafi Goldwasser and Mihir Bellare"
,
687 title = "Lecture Notes on Cryptography"
,
688 howpublished = "Summer Course ``Cryptography and Computer Security'' at
691 url
= "http
://citeseer.nj.nec.com
/goldwasser96lecture.html"
694 @InProceedings
{groth
-sahai
-2008:proofs
-for
-bilinear
-groups
,
695 author = "Jens Groth and Amit Sahai"
,
696 title = "Efficient Non
-interactive Proof Systems for Bilinear
698 booktitle = "EUROCRYPT"
,
701 ee
= "http
://dx.doi.org
/10.1007/978-3-540-78967-3_24"
,
702 crossref
= "DBLP
:conf
/eurocrypt
/2008"
,
703 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
706 @Manual
{ieee
-2000:1363,
707 title = "IEEE
1363-2000: Standard Specifications for Public Key
710 organization = "Microprocessor Standards Committee of the IEEE Computer
713 isbn
= "
0-7381-1956-3"
,
714 abstract = "This standard specifies common public
-key cryptographic
715 techniques
, including mathematical primitives for secret
716 value
(key) derivation
, public
-key encryption
, and digital
717 signatures
, and cryptographic schemes based on those
718 primitives. It also specifies related cryptographic
719 parameters
, public keys and private keys. The purpose of
720 this standard is to provide a reference for specifications
721 of a variety of techniques from which applications may
725 @Manual
{ieee
-2004:1363a
,
726 title = "
{IEEE
} 1363a
-2004: Standard Specifications for Public Key
727 Cryptography
-- Amendment
1: Additional Techniques"
,
729 organization = "Microprocessor Standards Committee of the IEEE Computer
732 note = "Amendment to \cite
{ieee
-2000:1363}."
,
733 isbn
= "
0-7381-4003-1"
,
734 abstract = "Amendment to IEEE Std
1363-2000. This standard specifies
735 additional public
-key cryptographic techniques beyond
736 those in IEEE Std
1363-2000. It is intended to be merged
737 with IEEE Std
1363-2000 during future revisions."
740 @PhdThesis
{jackson
-1997:who
-goes
-there
,
741 author = "Ian Jackson"
,
742 title = "Who goes there? Location confidentiality through
744 school = "Cambridge University Computer Laboratory"
,
747 url
= "http
://www.chiark.greenend.org.uk
/~ijackson
/thesis
/"
750 @Misc
{koblitz
-menezes
-2006:another
-look
-provable
-security
-ii
,
751 author = "Neal Koblitz and Alfred Menezes"
,
752 title = "Another Look at ``Provable Security'' II"
,
753 howpublished = "Cryptology ePrint Archive
, Report
2006/229"
,
755 url
= "http
://eprint.iacr.org
/2006/229"
758 @TechReport
{kocher
-1996:ssl3
,
759 author = "A. Frier and P. Karlton and P. Kocher"
,
760 title = "The
{SSL
3.0} Protocol"
,
761 institution = "Netscape Communications Corp."
,
764 url
= "http
://home.netscape.com
/eng
/ssl3
/ssl
-toc.html"
767 @Misc
{kohno
-2003:cwc
,
768 author = "Tadayoshi Kohno and John Viega and Doug Whiting"
,
769 title = "The CWC Authenticated Encryption
(Associated Data
) Mode"
,
770 howpublished = "Cryptology ePrint Archive
, Report
2003/106"
,
772 url
= "http
://eprint.iacr.org
/2003/106"
775 @InProceedings
{krawczyk
-2001:order
-enc
-authn
,
776 author = "Hugo Krawczyk"
,
777 title = "The Order of Encryption and Authentication for Protecting
778 Communications
(or
: How Secure Is
{SSL
}?
)"
,
779 booktitle = "Advances in cryptology
--- {CRYPTO
} 2001: 21st Annual
780 International Cryptology Conference
, Santa Barbara
,
781 California
, {USA
}, August
19--23, 2001: proceedings"
,
783 editor = "Joe Kilian"
,
785 series = "Lecture Notes in Computer Science"
,
787 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
788 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
789 isbn
= "
3-540-42456-3 (paperback
)"
,
791 "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/2139/21390310.htm"
794 @InProceedings
{maurer
-2009:unify
-proofs
-of
-knowledge
,
795 author = "Ueli M. Maurer"
,
796 title = "Unifying Zero
-Knowledge Proofs of Knowledge"
,
797 booktitle = "AFRICACRYPT"
,
800 ee
= "http
://dx.doi.org
/10.1007/978-3-642-02384-2_17"
,
801 crossref
= "DBLP
:conf
/africacrypt
/2009"
,
802 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
805 @InProceedings
{mcgrew
-viega
-2004:gcm
-security
-performance
,
806 author = "David A. McGrew and John Viega"
,
807 title = "The Security and Performance of the Galois
/Counter Mode
808 ({GCM
}) of Operation"
,
809 booktitle = "Progress in Cryptology
- {INDOCRYPT
} 2004, 5th
810 International Conference on Cryptology in India
, Chennai
,
811 India
, December
20-22, 2004, Proceedings"
,
813 editor = "Anne Canteaut and Kapalee Viswanathan"
,
815 series = "Lecture Notes in Computer Science"
,
817 publisher = "Springer"
,
818 bibdate
= "
2004-12-13"
,
819 bibsource
= "DBLP
, http
://dblp.uni
-trier.de
/db
/conf
/indocrypt
/indocrypt2004.html#McGrewV04"
,
820 isbn
= "
3-540-24130-2"
,
821 url
= "http
://eprint.iacr.org
/2004/193"
824 @Misc
{menezes
-2005:intro
-pairing
-crypto
,
825 author = "Alfred Menezes"
,
826 title = "An Introduction to Pairing
-Based Cryptography"
,
828 note = "Notes from lectures given in Santander
, Spain"
,
829 url
= "http
://www.cacr.math.uwaterloo.ca
/~ajmeneze
/publications
/pairings.pdf"
832 @Manual
{nist
-2005:cmac
,
833 title = "Recommentation for Block Cipher Modes of Operation
: The
834 {CMAC
} Mode for Authentication"
,
836 organization = pub
-NIST
,
837 address = pub
-NIST
:adr
,
840 volume = "SP~
800-38\
,B"
,
841 series = "Special Publications"
,
842 url
= "http
://csrc.nist.gov
/publications
/nistpubs
/800-38B
/SP_800
-38B.pdf"
845 @Manual
{nist
-2008:triple
-des
,
846 title = "Recommendation for the
{Triple Data Encryption Algorithm
}
847 ({TDEA
}) Block Cipher"
,
849 organization = pub
-NIST
,
850 address = pub
-NIST
:adr
,
853 volume = "SP~
800-67"
,
856 series = "Special Publications"
,
857 url
= "http
://csrc.nist.gov
/publications
/nistpubs
/800-67/SP800
-67.pdf"
,
858 acknowledgement
= ack
-nhfb
861 @Misc
{raimondo
-2006:deniable
-authn
-key-exchange
,
862 author = "Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk"
,
863 title = "Deniable Authentication and Key Exchange"
,
864 howpublished = "Cryptology ePrint Archive
, Report
2006/280"
,
866 url
= "http
://eprint.iacr.org
/2006/280"
870 author = "J. Postel"
,
871 title = "
{User Datagram Protocol
}"
,
872 howpublished = "RFC
768 (INTERNET STANDARD
)"
,
877 series = "Request for Comments"
,
878 url
= "http
://www.ietf.org
/rfc
/rfc768.txt"
882 author = "J. Postel"
,
883 title = "
{Transmission Control Protocol
}"
,
884 howpublished = "RFC
793 (INTERNET STANDARD
)"
,
887 note = "Updated by RFCs
1122, 3168, 6093, 6528"
,
890 series = "Request for Comments"
,
891 url
= "http
://www.ietf.org
/rfc
/rfc793.txt"
894 @InProceedings
{rogaway
-2001:ocb
,
895 author = "Phillip Rogaway and Mihir Bellare and John Black and Ted
897 title = "
{OCB
}: a block
-cipher mode of operation for efficient
898 authenticated encryption"
,
899 booktitle = "
{ACM
} Conference on Computer and Communications Security"
,
902 url
= "http
://www.cs.ucdavis.edu
/~rogaway
/ocb
/"
905 @InProceedings
{rogaway
-2002:aead
,
906 author = "Phillip Rogaway"
,
907 title = "Authenticated
-encryption with associated
-data"
,
908 booktitle = "Proceedings of the
9th
{ACM
} Conference on Computer and
909 Communications Security"
,
911 editor = "Ravi Sandhu"
,
914 address = "Washington
, DC
, USA"
,
915 publisher = "ACM Press"
,
916 added
-by
= "msteiner"
,
917 url
= "http
://www.cs.ucdavis.edu
/~rogaway
/papers
/ad.html"
,
918 added
-at
= "Sun Nov
16 12:50:24 2003"
,
919 abstract = "When a message is transformed into a ciphertext in a way
920 designed to protect both its privacy and authenticity
,
921 there may be additional information
, such as a packet
922 header
, that travels alongside the ciphertext
(at least
923 conceptually
) and must get authenticated with it. We
924 formalize and investigate this authenticated
-encryption
925 with associated
-data
(AEAD
) problem. Though the problem
926 has long been addressed in cryptographic practice
, it was
927 never provided a definition or even a name. We do this
,
928 and go on to look at efficient solutions for AEAD
, both in
929 general and for the authenticated
-encryption scheme
930 OCB. For the general setting we study two simple ways to
931 turn an authenticated
-encryption scheme that does not
932 support associated
-data into one that does
: nonce stealing
933 and ciphertext translation. For the case of OCB we
934 construct an AEAD
-scheme by combining OCB and the
935 pseudorandom function PMAC
, using the same
key for both
936 algorithms. We prove that
, despite ``interaction'' between
937 the two schemes when using a common
key, the combination
938 is sound. We also consider achieving AEAD by the generic
939 composition of a nonce
-based
, privacy
-only encryption
940 scheme and a pseudorandom function."
943 @Book
{schneier
-1996:applied
-crypto
,
944 author = "Bruce Schneier"
,
945 title = "Applied Cryptography
: Protocols
, Algorithms
, and Source
947 publisher = "John Wiley and Sons
, Inc."
,
949 address = "New York
, NY
, USA"
,
951 pages = "xxiii
+ 758"
,
952 isbn
= "
0-471-12845-7 (cloth
), 0-471-11709-9 (paper
)"
,
953 url
= "http
://www.counterpane.com
/applied.html"
956 @Article
{shoup
-1997:dh
-lower
-bounds
,
957 author = "Victor Shoup"
,
958 title = "Lower Bounds for Discrete Logarithms and Related Problems"
,
959 journal = "Lecture Notes in Computer Science"
,
963 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
964 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/1233/12330256.htm"
967 @Misc
{shoup
-1999:formal
-model
-key-exchange
,
968 author = "Victor Shoup"
,
969 title = "On Formal Models for Secure Key Exchange "
,
970 howpublished = "Cryptology ePrint Archive
, Report
1999/012"
,
972 url
= "http
://eprint.iacr.org
/1999/012"
975 @InProceedings
{shoup
-2001:oaep
-reconsidered
,
976 author = "Victor Shoup"
,
977 title = "
{OAEP
} Reconsidered"
,
978 booktitle = "Advances in cryptology
--- {CRYPTO
} 2001: 21st Annual
979 International Cryptology Conference
, Santa Barbara
,
980 California
, {USA
}, August
19--23, 2001: proceedings"
,
982 editor = "Joe Kilian"
,
984 series = "Lecture Notes in Computer Science"
,
986 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
987 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
988 isbn
= "
3-540-42456-3 (paperback
)"
,
989 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/bibs
/2139/21390239.htm"
992 @Unpublished
{shoup
-2001:proposal
-iso
-public
-key,
993 author = "Victor Shoup"
,
994 title = "Proposal for an
{ISO
} Standard for Public Key Encryption
996 note = "Unpublished manuscript"
,
998 url
= "http
://www.shoup.net
/papers
/"
1001 @Misc
{shoup
-2004:sequences
-of
-games
,
1002 author = "Victor Shoup"
,
1003 title = "Sequences of games
: a tool for taming complexity in
1005 howpublished = "Cryptology ePrint Archive
, Report
2004/332"
,
1007 url
= "http
://eprint.iacr.org
/2004/332"
1010 @TechReport
{silverman
-2000:cost
-based
-security
-analysis
,
1011 author = "Robert Silverman"
,
1012 title = "A Cost
-Based Security Analysis of Symmetric and Asymmetric
1014 institution = "RSA Laboratories"
,
1018 url
= "http
://www.rsa.com
/rsalabs
/node.asp?id
=2088"
1021 @Misc
{stinson
-wu
-2006:two
-flow
-zero
-knowledge
,
1022 author = "D.R. Stinson and J. Wu"
,
1023 title = "An Efficient and Secure Two
-flow Zero
-Knowledge
1024 Identification Protocol"
,
1025 howpublished = "Cryptology ePrint Archive
, Report
2006/337"
,
1027 url
= "http
://eprint.iacr.org
/2006/337"
1030 @Misc
{unicode
-2007:standard
,
1031 author = "Unicode Consortium"
,
1032 title = "The
{Unicode
} {Standard
} 5.0"
,
1034 url
= "http
://www.unicode.org
/versions
/Unicode5.0
.0/"
1037 @InProceedings
{wagner
-goldberg
:unix
-passwd
-hashing
,
1038 author = "David Wagner and Ian Goldberg"
,
1039 title = "Proofs of Security for the
{Unix
} Password Hashing
1042 crossref
= "Okamoto
:2000:ACA"
,
1043 url
= "http
://www.cs.berkeley.edu
/~daw
/papers
/"
1046 @Book
{washington
-2003:elliptic
-curves
,
1047 author = "Lawrence C. Washington"
,
1048 title = "Elliptic Curves
: Number Theory and Cryptography"
,
1049 publisher = "CRC Press"
,
1051 isbn
= "
1-584-88365-0"
,
1055 @TechReport
{wooding
-2000:storin
,
1056 author = "Mark Wooding"
,
1057 title = "
{Storin
}: A block cipher for digitial signal processors"
,
1058 institution = "Straylight
/Edgeware"
,
1060 url
= "http
://www.excessus.demon.co.uk
/crypto
/storin.ps.gz"
,
1061 abstract = "We present Storin
: a new
96-bit block cipher designed to
1062 play to the strengths of current digital signal processors
1063 (DSPs
). In particular
, DSPs tend to provide single
-cycle
1064 multiply
-and
-accumulate operations
, making matrix
1065 multiplications very cheap. Working in an environment
1066 where multiplication is as fast as exclusive
-or changes
1067 the usual perceptions about which operations provide good
1068 cryptographic strength cheaply. The scarcity of available
1069 memory
, for code and for tables
, and a penalty for
1070 nonsequential access to data also make traditional block
1071 ciphers based around substitution tables unsuitable."
1074 @Misc
{wooding
-2000:storin
-usenet
,
1075 author = "Mark Wooding"
,
1076 title = "Re
: Yet another block cipher
: {Storin
}"
,
1077 howpublished = "Usenet article in \texttt
{sci.crypt
}"
,
1079 note = "Message
-id
{\msgid
{<slrn8iqhaq
.872.mdw@mull.ncipher.com
>}}"
1082 @Misc
{wooding
-2003:new
-proofs
-old
-modes
,
1083 author = "Mark Wooding"
,
1084 title = "New proofs for old modes"
,
1085 howpublished = "Unpublished work in progress"
,
1089 @Misc
{wooding
-2006:wrestlers
,
1090 author = "Mark Wooding"
,
1091 title = "The Wrestlers Protocol
: A simple
, practical
, secure
,
1092 deniable protocol for
key-exchange"
,
1093 howpublished = "Cryptology ePrint Archive
, Report
2006/386"
,
1095 url
= "http
://eprint.iacr.org
/2006/386"
1098 @Misc
{wooding
-2010:tripe
,
1099 author = "Mark Wooding"
,
1100 title = "Trivial IP Encryption
(TrIPE
): A simple
{VPN
}"
,
1101 year = "
2001--2010"
,
1102 url
= "http
://git.distorted.org.uk
/~mdw
/tripe
/"
1105 @Misc
{ylonen
-2001:ssh
-transport
-layer
,
1106 author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and
1108 title = "
{SSH
} Transport Layer Protocol"
,
1109 howpublished = "Internet Draft"
,
1112 url
= "http
://www.ietf.org
/internet
-drafts
/draft
-ietf
-secsh
-transport
-09.txt"
1115 %%%--------------------------------------------------------------------------
1116 %%% Proceedings volumes.
1118 @Proceedings
{ACM
:1995:PTS
,
1119 title = "Proceedings of the twenty
-seventh annual
{ACM
} Symposium
1120 on Theory of Computing
: Las Vegas
, Nevada
, May
29--June
1,
1123 booktitle = "Proceedings of the twenty
-seventh annual
{ACM
} Symposium
1124 on Theory of Computing
: Las Vegas
, Nevada
, May
29--June
1,
1127 address = "New York
, NY
, USA"
,
1128 publisher = "ACM Press"
,
1129 note = "ACM order no.
508950."
,
1130 pages = "viii
+ 763"
,
1131 isbn
= "
0-89791-718-9"
1134 @Proceedings
{ACM
:1998:PTA
,
1135 title = "Proceedings of the thirtieth annual
{ACM
} Symposium on
1136 Theory of Computing
: Dallas
, Texas
, May
23--26, 1998"
,
1138 booktitle = "Proceedings of the thirtieth annual
{ACM
} Symposium on
1139 Theory of Computing
: Dallas
, Texas
, May
23--26, 1998"
,
1141 address = "New York
, NY
, USA"
,
1142 publisher = "ACM Press"
,
1143 note = "ACM order
number 508980."
,
1145 isbn
= "
0-89791-962-9"
1148 @Proceedings
{Blakley
:1985:ACP
,
1149 title = "
{Advances in Cryptology
: Proceedings of CRYPTO
84}"
,
1151 booktitle = "
{Advances in Cryptology
: Proceedings of CRYPTO
84}"
,
1152 editor = "George Robert Blakley and David Chaum"
,
1154 series = "Lecture Notes in Computer Science"
,
1155 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
1156 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
1157 note = "CRYPTO
84: a Workshop on the Theory and Application of
1158 Cryptographic Techniques
, held at the University of
1159 California
, Santa Barbara
, August
19--22, 1984, sponsored
1160 by the International Association for Cryptologic
1163 doi
= "https
://doi.org
/10.1007/3-540-39568-7"
,
1164 isbn
= "
0-387-15658-5; 3-540-39568-7"
,
1165 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
1166 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/tocs
/t0196.htm"
1169 @Proceedings
{Coppersmith
:1995:ACC
,
1170 title = "
{Advances in cryptology
, {CRYPTO '
95}: 15th Annual
1171 International Cryptology Conference
, Santa Barbara
,
1172 California
, {USA
}, August
27--31, 1995: proceedings
}"
,
1174 booktitle = "
{Advances in cryptology
, {CRYPTO '
95}: 15th Annual
1175 International Cryptology Conference
, Santa Barbara
,
1176 California
, {USA
}, August
27--31, 1995: proceedings
}"
,
1177 editor = "Don Coppersmith"
,
1179 series = "Lecture Notes in Computer Science"
,
1180 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
1181 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
1182 note = "Sponsored by the International Association for Cryptologic
1183 Research
(IACR
), in cooperation with the IEEE Computer
1184 Society Technical Committee on Security and Privacy."
,
1185 pages = "xii
+ 465"
,
1187 isbn
= "
3-540-60221-6 (Berlin
)"
,
1188 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
1189 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/tocs
/t0963.htm"
1192 @Proceedings
{DBLP
:conf
/africacrypt
/2009,
1193 title = "Progress in Cryptology
- AFRICACRYPT
2009, Second
1194 International Conference on Cryptology in Africa
,
1195 Gammarth
, Tunisia
, June
21-25, 2009. Proceedings"
,
1197 booktitle = "AFRICACRYPT"
,
1198 editor = "Bart Preneel"
,
1200 series = "Lecture Notes in Computer Science"
,
1201 publisher = "Springer"
,
1202 isbn
= "
978-3-642-02383-5"
,
1203 ee
= "http
://dx.doi.org
/10.1007/978-3-642-02384-2"
,
1204 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
1207 @Proceedings
{DBLP
:conf
/eurocrypt
/2008,
1208 title = "Advances in Cryptology
- EUROCRYPT
2008, 27th Annual
1209 International Conference on the Theory and Applications of
1210 Cryptographic Techniques
, Istanbul
, Turkey
, April
13-17,
1213 booktitle = "EUROCRYPT"
,
1214 editor = "Nigel P. Smart"
,
1216 series = "Lecture Notes in Computer Science"
,
1217 publisher = "Springer"
,
1218 isbn
= "
978-3-540-78966-6"
,
1219 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
1222 @Proceedings
{DBLP
:conf
/fse
/2001,
1223 title = "Fast Software Encryption
, 8th International Workshop
, FSE
1224 2001 Yokohama
, Japan
, April
2-4, 2001, Revised Papers"
,
1227 editor = "Mitsuru Matsui"
,
1229 series = "Lecture Notes in Computer Science"
,
1230 publisher = "Springer"
,
1231 isbn
= "
3-540-43869-6"
,
1232 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
1235 @Proceedings
{DBLP
:conf
/fse
/2005,
1236 title = "Fast Software Encryption
: 12th International Workshop
,
1237 {FSE
} 2005, Paris
, France
, February
21-23, 2005, Revised
1240 editor = "Henri Gilbert and Helena Handschuh"
,
1242 series = "Lecture Notes in Computer Science"
,
1243 publisher = "Springer"
,
1244 url
= "https
://doi.org
/10.1007/b137506"
,
1245 doi
= "
10.1007/b137506"
,
1246 isbn
= "
3-540-26541-4"
,
1247 timestamp
= "Tue
, 30 May
2017 16:36:53 +0200"
,
1248 biburl
= "http
://dblp.uni
-trier.de
/rec
/bib
/conf
/fse
/2005"
,
1249 bibsource
= "dblp computer science bibliography
, http
://dblp.org"
1252 @Proceedings
{DBLP
:conf
/indocrypt
/2004,
1253 title = "Progress in Cryptology
- INDOCRYPT
2004, 5th International
1254 Conference on Cryptology in India
, Chennai
, India
,
1255 December
20-22, 2004, Proceedings"
,
1257 booktitle = "INDOCRYPT"
,
1258 editor = "Anne Canteaut and Kapalee Viswanathan"
,
1260 series = "Lecture Notes in Computer Science"
,
1261 publisher = "Springer"
,
1262 isbn
= "
3-540-24130-2"
,
1263 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
1266 @Proceedings
{DBLP
:conf
/pkc
/2006,
1267 title = "Public Key Cryptography
- {PKC
} 2006, 9th International
1268 Conference on Theory and Practice of Public
-Key
1269 Cryptography
, New York
, NY
, USA
, April
24-26, 2006,
1272 editor = "Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal
1275 series = "Lecture Notes in Computer Science"
,
1276 publisher = "Springer"
,
1277 url
= "https
://doi.org
/10.1007/11745853"
,
1278 doi
= "
10.1007/11745853"
,
1279 isbn
= "
3-540-33851-9"
,
1280 timestamp
= "Tue
, 30 May
2017 16:36:52 +0200"
,
1281 biburl
= "http
://dblp.uni
-trier.de
/rec
/bib
/conf
/pkc
/2006"
,
1282 bibsource
= "dblp computer science bibliography
, http
://dblp.org"
1285 @Proceedings
{DBLP
:conf
/wpes
/2004,
1286 title = "Proceedings of the
2004 ACM Workshop on Privacy in the
1287 Electronic Society
, WPES
2004, Washington
, DC
, USA
,
1291 editor = "Vijay Atluri and Paul F. Syverson and Sabrina De Capitani
1294 isbn
= "
1-58113-968-3"
,
1295 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
1298 @Proceedings
{DBLP
:conf
/wpes
/2007,
1299 title = "Proceedings of the
2007 ACM Workshop on Privacy in the
1300 Electronic Society
, WPES
2007, Alexandria
, VA
, USA
,
1304 editor = "Peng Ning and Ting Yu"
,
1306 isbn
= "
978-1-59593-883-1"
,
1307 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
1310 @Proceedings
{DeSantis
:1995:ACE
,
1311 title = "Advances in cryptology
--- {EUROCRYPT
} '
94: Workshop on
1312 the Theory and Application of Cryptographic Techniques
,
1313 Perugia
, Italy
, May
9--12, 1994: proceedings"
,
1315 booktitle = "Advances in cryptology
--- {EUROCRYPT
} '
94: Workshop on
1316 the Theory and Application of Cryptographic Techniques
,
1317 Perugia
, Italy
, May
9--12, 1994: proceedings"
,
1318 editor = "Alfredo
{De Santis
}"
,
1320 series = "Lecture Notes in Computer Science"
,
1321 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
1322 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
1323 pages = "xiii
+ 472"
,
1324 isbn
= "
3-540-60176-7"
,
1325 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
1328 @Proceedings
{Desmedt
:1994:ACC
,
1329 title = "
{Advances in cryptology
, {CRYPTO '
94}: 14th annual
1330 international cryptology conference
, Santa Barbara
,
1331 California
, {USA
}, August
21--25, 1994: proceedings
}"
,
1333 booktitle = "
{Advances in cryptology
, {CRYPTO '
94}: 14th annual
1334 international cryptology conference
, Santa Barbara
,
1335 California
, {USA
}, August
21--25, 1994: proceedings
}"
,
1336 editor = "Yvo G. Desmedt"
,
1338 series = "Lecture Notes in Computer Science"
,
1339 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
1340 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
1341 pages = "xii
+ 438"
,
1343 isbn
= "
3-540-58333-5 (Berlin
), 0-387-58333-5 (New York
)"
,
1344 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
1345 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/tocs
/t0839.htm"
1348 @Proceedings
{IEEE
:1997:ASF
,
1349 title = "
38th Annual Symposium on Foundations of Computer Science
:
1350 October
20--22, 1997, Miami Beach
, Florida"
,
1352 booktitle = "
38th Annual Symposium on Foundations of Computer Science
:
1353 October
20--22, 1997, Miami Beach
, Florida"
,
1355 address = "
1109 Spring Street
, Suite
300, Silver Spring
, MD
20910,
1357 publisher = "IEEE Computer Society Press"
,
1358 note = "IEEE catalog
number 97CB36150. IEEE Computer Society Press
1359 order
number PR08197."
,
1360 key = "IEEE
-FOCS'
97"
,
1361 pages = "xiii
+ 606"
,
1362 isbn
= "
0-8186-8197-7 (paperback
), 0-8186-8198-5 (casebound
),
1363 0-8186-8199-3 (microfiche
)"
,
1367 @Proceedings
{IEEE
:2001:ISF
,
1368 title = "
{42nd IEEE Symposium on Foundations of Computer Science
:
1369 proceedings
: October
14--17, 2001, Las Vegas
, Nevada
,
1372 booktitle = "
{42nd IEEE Symposium on Foundations of Computer Science
:
1373 proceedings
: October
14--17, 2001, Las Vegas
, Nevada
,
1376 address = "
1109 Spring Street
, Suite
300, Silver Spring
, MD
20910,
1378 publisher = "IEEE Computer Society Press"
,
1379 pages = "xiii
+ 670"
,
1380 isbn
= "
0-7695-1390-5, 0-7695-1391-3 (case
), 0-7695-1392-1
1385 @Proceedings
{Kilian
:2001:ACC
,
1386 title = "Advances in cryptology
--- {CRYPTO
} 2001: 21st Annual
1387 International Cryptology Conference
, Santa Barbara
,
1388 California
, {USA
}, August
19--23, 2001: proceedings"
,
1390 booktitle = "Advances in cryptology
--- {CRYPTO
} 2001: 21st Annual
1391 International Cryptology Conference
, Santa Barbara
,
1392 California
, {USA
}, August
19--23, 2001: proceedings"
,
1393 editor = "Joe Kilian"
,
1395 series = "Lecture Notes in Computer Science"
,
1396 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
1397 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
1399 isbn
= "
3-540-42456-3 (paperback
)"
,
1400 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/tocs
/t2139.htm"
1403 @Proceedings
{Koblitz
:1996:ACC
,
1404 title = "
{Advances in cryptology
, {CRYPTO '
96}: 16th annual
1405 international cryptology conference
, Santa Barbara
,
1406 California
, {USA
}, August
18--22, 1996: proceedings
}"
,
1408 booktitle = "
{Advances in cryptology
, {CRYPTO '
96}: 16th annual
1409 international cryptology conference
, Santa Barbara
,
1410 California
, {USA
}, August
18--22, 1996: proceedings
}"
,
1411 editor = "Neal Koblitz"
,
1413 series = "Lecture Notes in Computer Science"
,
1414 address = "Berlin
, Germany~
/ Heidelberg
, Germany~
/ London
, UK~
/ etc."
,
1415 publisher = "Spring
{\
-}er
-Ver
{\
-}lag"
,
1416 note = "Sponsored by the International Association for Cryptologic
1417 Research
(IACR
), in cooperation with the IEEE Computer
1418 Society Technical Committee on Security and Privacy and
1419 the Computer Science Department of the University of
1420 California at Santa Barbara
(UCSB
)."
,
1421 annote = "``Sponsored by the International Association for
1422 Cryptologic Research
(IACR
), in cooperation with the IEEE
1423 Computer Society Technical Committee on Security and
1424 Privacy and the Computer Science Department of the
1425 University of California at Santa Barbara
(UCSB
)''"
,
1426 pages = "xii
+ 415"
,
1428 isbn
= "
3-540-61512-1"
,
1429 issn
= "
0302-9743 (print
), 1611-3349 (electronic
)"
,
1430 url
= "http
://link.springer
-ny.com
/link
/service
/series/0558/tocs
/t1109.htm"
1433 %%%--------------------------------------------------------------------------
1435 %%% Local variables:
1437 %%% bibtex-maintain-sorted-entries: entry-class
1438 %%% bibtex-sort-entry-class: (("String") (catch-all) ("Proceedings"))