3 %%%--------------------------------------------------------------------------
8 \ifx\url\undefined\let\url\texttt\fi
9 \ifx\msgid\undefined\let\msgid\texttt\fi
10 \let\mdwxxthebibliography\thebibliography
11 \def\thebibliography
{\mdwxxbibhook\mdwxxthebibliography
}
13 \def\biburl
{\bgroup\catcode`\#
12\relax\biburlx
}
14 \def\biburlx#
1{\let\biburlsep\empty\biburlxi#
1;;\done\egroup
}
15 \def\biburlxi#
1;{\def\temp
{#
1}\ifx\temp\empty\expandafter\biburlxiii\else
16 \biburlxii#
1,,\done\let\biburlxafter\biburlxi\expandafter\biburlxmunch\fi
}
17 \def\biburlxii#
1,{\def\temp
{#
1}\ifx\temp\empty\expandafter\biburlxiii\else
18 \biburlsep\mdwxxurl
{#
1}\def\biburlsep
{, }\let\biburlxafter\biburlxii
19 \expandafter\biburlxmunch\fi
}
20 \def\biburlxiii#
1\done
{}
21 \def\biburlxmunch
{\futurelet\next\biburlxmunchi
}
22 \def\biburlxmunchi
{\expandafter\ifx\space\next\expandafter\biburlxmunchii
23 \else\expandafter\biburlxafter\fi
}
24 \expandafter\def\expandafter\biburlxmunchii\space
{\biburlxmunch
}
25 \def\mdwxxbibhook
{\let\mdwxxurl\url\let\url\biburl
}
29 %%%--------------------------------------------------------------------------
30 %%% The main bibliography.
32 @InProceedings
{abdalla
-2001:dhies
,
33 author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway"
,
34 title = "
{DHIES
}: An Encryption Scheme Based on the
35 {Diffie
--Hellman
} Problem"
,
37 crossref
= "Naccache
:2001:TCC"
,
38 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/dhies.html"
41 @InProceedings
{alexander
-goldberg
-2007:improved
-user
-authn
-otr
,
42 author = "Chris Alexander and Ian Goldberg"
,
43 title = "Improved user authentication in off
-the
-record messaging"
,
47 ee
= "http
://doi.acm.org
/10.1145/1314333.1314340"
,
48 url
= "http
://www.cypherpunks.ca
/~iang
/pubs
/impauth.pdf"
,
49 crossref
= "DBLP
:conf
/wpes
/2007"
,
50 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
53 @InProceedings
{bellare
-2004:eax
,
54 author = "Mihir Bellare and Phillip Rogaway and David Wagner"
,
55 title = "The
{EAX
} Mode of Operation"
,
58 editor = "Bimal K. Roy and Willi Meier"
,
60 series = "Lecture Notes in Computer Science"
,
62 publisher = "Springer"
,
63 bibdate
= "
2004-07-29"
,
65 http
://dblp.uni
-trier.de
/db
/conf
/fse
/fse2004.html#BellareRW04"
,
66 booktitle = "Fast Software Encryption
, 11th International Workshop
,
67 {FSE
} 2004, Delhi
, India
, February
5-7, 2004, Revised
69 isbn
= "
3-540-22171-9"
,
70 url
= "http
://www.cs.berkeley.edu
/~daw
/papers
/eax
-fse04.ps"
73 @InProceedings
{bellare
-rogaway
-1993:random
-oracles
,
74 author = "Mihir Bellare and Phillip Rogaway"
,
75 title = "Random oracles are practical"
,
76 booktitle = "Proceedings of the First Annual Conference on Computer and
77 Communications Security"
,
80 organization = "
{ACM
}"
,
81 url
= "http
://www
-cse.ucsd.edu
/users
/mihir
/papers
/ro.html"
84 @InProceedings
{bellare
-rogaway
-2006:security
-triple
-encryption
,
85 author = "Mihir Bellare and Phillip Rogaway"
,
86 title = "The Security of Triple Encryption and a Framework for
87 Code
-Based Game
-Playing Proofs"
,
88 booktitle = "Advances in Cryptology
- {EUROCRYPT
} 2006, 25th Annual
89 International Conference on the Theory and Applications of
90 Cryptographic Techniques
, St. Petersburg
, Russia
, May
28 -
91 June
1, 2006, Proceedings"
,
93 editor = "Serge Vaudenay"
,
95 series = "Lecture Notes in Computer Science"
,
97 publisher = "Springer"
,
98 note = "Proceedings version of \cite
{cryptoeprint
:2004:331}"
,
99 bibdate
= "
2006-07-05"
,
101 http
://dblp.uni
-trier.de
/db
/conf
/eurocrypt
/eurocrypt2006.html#BellareR06"
,
102 isbn
= "
3-540-34546-9"
105 @InProceedings
{bernstein
-2005:poly1305
,
106 author = "Daniel J. Bernstein"
,
107 title = "The Poly1305
-AES Message
-Authentication Code"
,
108 booktitle = "Fast Software Encryption
: 12th International Workshop
,
109 {FSE
} 2005, Paris
, France
, February
21-23, 2005, Revised
113 crossref
= "DBLP
:conf
/fse
/2005"
,
114 url
= "https
://doi.org
/10.1007/11502760_3"
,
115 doi
= "
10.1007/11502760_3"
,
116 timestamp
= "Tue
, 30 May
2017 16:36:53 +0200"
,
117 biburl
= "http
://dblp.uni
-trier.de
/rec
/bib
/conf
/fse
/Bernstein05"
,
118 bibsource
= "dblp computer science bibliography
, http
://dblp.org"
121 @Misc
{bernstein
-2005:salsa20
,
122 author = "Daniel J. Bernstein"
,
123 title = "
{Salsa20
} Specification"
,
124 howpublished = "Submission to the ECRYPT Stream Cipher project
(eSTREAM
)"
,
127 url
= "https
://cr.yp.to
/snuffle
/spec.pdf"
130 @InProceedings
{bernstein
-2006:curve25519
,
131 author = "Daniel J. Bernstein"
,
132 title = "Curve25519
: New Diffie
-Hellman Speed Records"
,
133 booktitle = "Public Key Cryptography
- {PKC
} 2006, 9th International
134 Conference on Theory and Practice of Public
-Key
135 Cryptography
, New York
, NY
, USA
, April
24-26, 2006,
139 crossref
= "DBLP
:conf
/pkc
/2006"
,
140 url
= "https
://cr.yp.to
/papers.html#curve25519"
,
141 doi
= "
10.1007/11745853_14"
,
142 timestamp
= "Tue
, 30 May
2017 16:36:52 +0200"
,
143 biburl
= "http
://dblp.uni
-trier.de
/rec
/bib
/conf
/pkc
/Bernstein06"
,
144 bibsource
= "dblp computer science bibliography
, http
://dblp.org"
147 @InProceedings
{borisov
-2004:off
-the
-record
,
148 author = "Nikita Borisov and Ian Goldberg and Eric A. Brewer"
,
149 title = "Off
-the
-record communication
, or
, why not to use PGP"
,
153 ee
= "http
://doi.acm.org
/10.1145/1029179.1029200"
,
154 url
= "http
://www.cypherpunks.ca
/otr
/otr
-wpes.pdf"
,
155 crossref
= "DBLP
:conf
/wpes
/2004"
,
156 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
159 @InProceedings
{brassard
-crepeau
-1989:sorting
-zero
-knowledge
,
160 author = "Gilles Brassard and Claude Crepeau"
,
161 title = "Sorting out Zero
-Knowledge"
,
162 booktitle = "Theory and Application of Cryptographic Techniques"
,
165 url
= "http
://citeseer.nj.nec.com
/brassard90sorting.html"
168 @TechReport
{canetti
-2001:universally
-composable
-security
,
169 author = "Ran Canetti"
,
170 title = "Universally Composable Security
: {A
} New Paradigm for
171 Cryptographic Protocols"
,
172 institution = "Cryptology
{ePrint
} Archive"
,
177 note = "Extended Abstract appeared in proceedings of the
42nd
178 Symposium on Foundations of Computer Science
(FOCS
), 2001"
,
179 annote = "Revised version of \cite
{Canetti
:2000:SCM
}."
,
181 url
= "http
://eprint.iacr.org
/2000/067"
,
182 abstract = "We propose a new paradigm for defining security of
183 cryptographic protocols
, called
{\sf universally
184 composable security.
} The salient property of universally
185 composable definitions of security is that they guarantee
186 security even when a secure protocol is composed with an
187 arbitrary set of protocols
, or more generally when the
188 protocol is used as a component of an arbitrary
189 system. This is an essential property for maintaining
190 security of cryptographic protocols in complex and
191 unpredictable environments such as the Internet. In
192 particular
, universally composable definitions guarantee
193 security even when an unbounded
number of protocol
194 instances are executed concurrently in an adversarially
195 controlled manner
, they guarantee non
-malleability with
196 respect to arbitrary protocols
, and more. We show how to
197 formulate universally composable definitions of security
198 for practically any cryptographic task. Furthermore
, we
199 demonstrate that practically any such definition can be
200 realized using known general techniques
, as long as only a
201 minority of the participants are corrupted. We then
202 proceed to formulate universally composable definitions of
203 a wide array of cryptographic tasks
, including
204 authenticated and secure communication
, key-exchange
,
205 public
-key encryption
, signature
, commitment
, oblivious
206 transfer
, zero
-knowledge
, and more. We also make initial
207 steps towards studying the realizability of the proposed
208 definitions in other natural settings."
,
209 keywords = "foundations
/ cryptographic protocols
, security analysis
210 of protocols
, concurrent composition"
,
211 added
-at
= "Wed Oct
17 16:02:37 2001"
214 @Misc
{certicom
-2000:sec1
,
215 author = "
{Certicom Research
}"
,
216 title = "Standards for Efficient Cryptography
, {SEC
} 1: {E
}lliptic
217 curve cryptography
, Version
1.0"
,
219 url
= "http
://www.secg.org
/download
/aid
-385/sec1_final.pdf"
222 @PhdThesis
{daemen
-1995:cipher
-hash
-design
,
223 author = "Joan Daemen"
,
224 title = "Cipher and hash function design strategies based on linear
225 and differential cryptanalysis"
,
226 school = "K. U. Leuven"
,
230 @Manual
{dworkin
-2010:cbc
-ciphertext
-stealing
,
231 title = "Recommendation for Block Cipher Modes of Operation
: Three
232 Variants of Ciphertext Stealing for CBC Mode"
,
233 author = "Morris Dworkin"
,
234 organization = pub
-NIST
,
235 address = pub
-NIST
:adr
,
238 note = "Addendum to NIST Special Publication
800-38A"
,
240 url
= "http
://nvlpubs.nist.gov
/nistpubs
/Legacy
/SP
/nistspecialpublication800
-38a
-add.pdf"
243 @Misc
{ellis
-1997:non
-secret
-encryption
,
244 author = "James Ellis"
,
245 title = "The Story of Non
-Secret Encryption"
,
246 howpublished = "CESG internal document"
,
249 note = "Released internally in
1987."
,
250 url
= "http
://www.jya.com
/ellisdoc.htm"
253 @Misc
{ferguson
-2005:gcm
-authn
-weakness
,
254 author = "Niels Ferguson"
,
255 title = "Authentication Weaknesses in
{GCM
}"
,
258 note = "Public comment to NIST"
,
259 url
= "http
://csrc.nist.gov
/groups
/ST
/toolkit
/BCM
/documents
/comments
/CWC
-GCM
/Ferguson2.pdf"
262 @Misc
{fisher
-2000:storin
-usenet
,
263 author = "Matthew Fisher"
,
264 title = "Re
: Yet another block cipher
: {Storin
}"
,
265 howpublished = "Usenet article in
{\texttt
{sci.crypt
}}"
,
267 note = "Message
-id
{\msgid
{<8gjctn\$
9ct\$
1@nnrp1.deja.com
>}}"
270 @Misc
{goldwasser
-bellare
-1999:lecture
-notes
-crypto
,
271 author = "Shafi Goldwasser and Mihir Bellare"
,
272 title = "Lecture Notes on Cryptography"
,
273 howpublished = "Summer Course ``Cryptography and Computer Security'' at
276 url
= "http
://citeseer.nj.nec.com
/goldwasser96lecture.html"
279 @InProceedings
{groth
-sahai
-2008:proofs
-for
-bilinear
-groups
,
280 author = "Jens Groth and Amit Sahai"
,
281 title = "Efficient Non
-interactive Proof Systems for Bilinear
283 booktitle = "EUROCRYPT"
,
286 ee
= "http
://dx.doi.org
/10.1007/978-3-540-78967-3_24"
,
287 crossref
= "DBLP
:conf
/eurocrypt
/2008"
,
288 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
291 @Manual
{ieee
-2000:1363,
292 title = "IEEE
1363-2000: Standard Specifications for Public Key
295 organization = "Microprocessor Standards Committee of the IEEE Computer
298 isbn
= "
0-7381-1956-3"
,
299 abstract = "This standard specifies common public
-key cryptographic
300 techniques
, including mathematical primitives for secret
301 value
(key) derivation
, public
-key encryption
, and digital
302 signatures
, and cryptographic schemes based on those
303 primitives. It also specifies related cryptographic
304 parameters
, public keys and private keys. The purpose of
305 this standard is to provide a reference for specifications
306 of a variety of techniques from which applications may
310 @Manual
{ieee
-2004:1363a
,
311 title = "
{IEEE
} 1363a
-2004: Standard Specifications for Public Key
312 Cryptography
-- Amendment
1: Additional Techniques"
,
314 organization = "Microprocessor Standards Committee of the IEEE Computer
317 note = "Amendment to \cite
{IEEE
:2000:1363}."
,
318 isbn
= "
0-7381-4003-1"
,
319 abstract = "Amendment to IEEE Std
1363-2000. This standard specifies
320 additional public
-key cryptographic techniques beyond
321 those in IEEE Std
1363-2000. It is intended to be merged
322 with IEEE Std
1363-2000 during future revisions."
325 @PhdThesis
{jackson
-1997:who
-goes
-there
,
326 author = "Ian Jackson"
,
327 title = "Who goes there? Location confidentiality through
329 school = "Cambridge University Computer Laboratory"
,
332 url
= "http
://www.chiark.greenend.org.uk
/~ijackson
/thesis
/"
335 @TechReport
{kocher
-1996:ssl3
,
336 author = "A. Frier and P. Karlton and P. Kocher"
,
337 title = "The
{SSL
3.0} Protocol"
,
338 institution = "Netscape Communications Corp."
,
341 url
= "http
://home.netscape.com
/eng
/ssl3
/ssl
-toc.html"
344 @Misc
{kohno
-2003:cwc
,
345 author = "Tadayoshi Kohno and John Viega and Doug Whiting"
,
346 title = "The CWC Authenticated Encryption
(Associated Data
) Mode"
,
347 howpublished = "Cryptology ePrint Archive
, Report
2003/106"
,
349 url
= "http
://eprint.iacr.org
/2003/106"
352 @InProceedings
{maurer
-2009:unify
-proofs
-of
-knowledge
,
353 author = "Ueli M. Maurer"
,
354 title = "Unifying Zero
-Knowledge Proofs of Knowledge"
,
355 booktitle = "AFRICACRYPT"
,
358 ee
= "http
://dx.doi.org
/10.1007/978-3-642-02384-2_17"
,
359 crossref
= "DBLP
:conf
/africacrypt
/2009"
,
360 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
363 @InProceedings
{mcgrew
-viega
-2004:gcm
-security
-performance
,
364 author = "David A. McGrew and John Viega"
,
365 title = "The Security and Performance of the Galois
/Counter Mode
366 ({GCM
}) of Operation"
,
367 booktitle = "Progress in Cryptology
- {INDOCRYPT
} 2004, 5th
368 International Conference on Cryptology in India
, Chennai
,
369 India
, December
20-22, 2004, Proceedings"
,
371 editor = "Anne Canteaut and Kapalee Viswanathan"
,
373 series = "Lecture Notes in Computer Science"
,
375 publisher = "Springer"
,
376 bibdate
= "
2004-12-13"
,
377 bibsource
= "DBLP
, http
://dblp.uni
-trier.de
/db
/conf
/indocrypt
/indocrypt2004.html#McGrewV04"
,
378 isbn
= "
3-540-24130-2"
,
379 url
= "http
://eprint.iacr.org
/2004/193"
382 @Misc
{menezes
-2005:intro
-pairing
-crypto
,
383 author = "Alfred Menezes"
,
384 title = "An Introduction to Pairing
-Based Cryptography"
,
386 note = "Notes from lectures given in Santander
, Spain"
,
387 url
= "http
://www.cacr.math.uwaterloo.ca
/~ajmeneze
/publications
/pairings.pdf"
390 @Manual
{nist
-2005:cmac
,
391 title = "Recommentation for Block Cipher Modes of Operation
: The
392 {CMAC
} Mode for Authentication"
,
394 organization = pub
-NIST
,
395 address = pub
-NIST
:adr
,
398 volume = "SP~
800-38\
,B"
,
399 series = "Special Publications"
,
400 url
= "http
://csrc.nist.gov
/publications
/nistpubs
/800-38B
/SP_800
-38B.pdf"
403 @Manual
{nist
-2008:triple
-des
,
404 title = "Recommendation for the
{Triple Data Encryption Algorithm
}
405 ({TDEA
}) Block Cipher"
,
407 organization = pub
-NIST
,
408 address = pub
-NIST
:adr
,
411 volume = "SP~
800-67"
,
414 series = "Special Publications"
,
415 url
= "http
://csrc.nist.gov
/publications
/nistpubs
/800-67/SP800
-67.pdf"
,
416 acknowledgement
= ack
-nhfb
419 @InProceedings
{rogaway
-2001:ocb
,
420 author = "Phillip Rogaway and Mihir Bellare and John Black and Ted
422 title = "
{OCB
}: a block
-cipher mode of operation for efficient
423 authenticated encryption"
,
424 booktitle = "
{ACM
} Conference on Computer and Communications Security"
,
427 url
= "http
://www.cs.ucdavis.edu
/~rogaway
/ocb
/"
430 @InProceedings
{rogaway
-2002:aead
,
431 author = "Phillip Rogaway"
,
432 title = "Authenticated
-encryption with associated
-data"
,
433 booktitle = "Proceedings of the
9th
{ACM
} Conference on Computer and
434 Communications Security"
,
436 editor = "Ravi Sandhu"
,
439 address = "Washington
, DC
, USA"
,
440 publisher = "ACM Press"
,
441 added
-by
= "msteiner"
,
442 url
= "http
://www.cs.ucdavis.edu
/~rogaway
/papers
/ad.html"
,
443 added
-at
= "Sun Nov
16 12:50:24 2003"
,
444 abstract = "When a message is transformed into a ciphertext in a way
445 designed to protect both its privacy and authenticity
,
446 there may be additional information
, such as a packet
447 header
, that travels alongside the ciphertext
(at least
448 conceptually
) and must get authenticated with it. We
449 formalize and investigate this authenticated
-encryption
450 with associated
-data
(AEAD
) problem. Though the problem
451 has long been addressed in cryptographic practice
, it was
452 never provided a definition or even a name. We do this
,
453 and go on to look at efficient solutions for AEAD
, both in
454 general and for the authenticated
-encryption scheme
455 OCB. For the general setting we study two simple ways to
456 turn an authenticated
-encryption scheme that does not
457 support associated
-data into one that does
: nonce stealing
458 and ciphertext translation. For the case of OCB we
459 construct an AEAD
-scheme by combining OCB and the
460 pseudorandom function PMAC
, using the same
key for both
461 algorithms. We prove that
, despite ``interaction'' between
462 the two schemes when using a common
key, the combination
463 is sound. We also consider achieving AEAD by the generic
464 composition of a nonce
-based
, privacy
-only encryption
465 scheme and a pseudorandom function."
468 @Unpublished
{shoup
-2001:proposal
-iso
-public
-key,
469 author = "Victor Shoup"
,
470 title = "Proposal for an
{ISO
} Standard for Public Key Encryption
472 note = "Unpublished manuscript"
,
474 url
= "http
://www.shoup.net
/papers
/"
477 @TechReport
{silverman
-2000:cost
-based
-security
-analysis
,
478 author = "Robert Silverman"
,
479 title = "A Cost
-Based Security Analysis of Symmetric and Asymmetric
481 institution = "RSA Laboratories"
,
485 url
= "http
://www.rsa.com
/rsalabs
/node.asp?id
=2088"
488 @Misc
{unicode
-2007:standard
,
489 author = "Unicode Consortium"
,
490 title = "The
{Unicode
} {Standard
} 5.0"
,
492 url
= "http
://www.unicode.org
/versions
/Unicode5.0
.0/"
495 @InProceedings
{wagner
-goldberg
:unix
-passwd
-hashing
,
496 author = "David Wagner and Ian Goldberg"
,
497 title = "Proofs of Security for the
{Unix
} Password Hashing
500 crossref
= "Okamoto
:2000:ACA"
,
501 url
= "http
://www.cs.berkeley.edu
/~daw
/papers
/"
504 @Book
{washington
-2003:elliptic
-curves
,
505 author = "Lawrence C. Washington"
,
506 title = "Elliptic Curves
: Number Theory and Cryptography"
,
507 publisher = "CRC Press"
,
509 isbn
= "
1-584-88365-0"
,
513 @TechReport
{wooding
-2000:storin
,
514 author = "Mark Wooding"
,
515 title = "
{Storin
}: A block cipher for digitial signal processors"
,
516 institution = "Straylight
/Edgeware"
,
518 url
= "http
://www.excessus.demon.co.uk
/crypto
/storin.ps.gz"
,
519 abstract = "We present Storin
: a new
96-bit block cipher designed to
520 play to the strengths of current digital signal processors
521 (DSPs
). In particular
, DSPs tend to provide single
-cycle
522 multiply
-and
-accumulate operations
, making matrix
523 multiplications very cheap. Working in an environment
524 where multiplication is as fast as exclusive
-or changes
525 the usual perceptions about which operations provide good
526 cryptographic strength cheaply. The scarcity of available
527 memory
, for code and for tables
, and a penalty for
528 nonsequential access to data also make traditional block
529 ciphers based around substitution tables unsuitable."
532 @Misc
{wooding
-2000:storin
-usenet
,
533 author = "Mark Wooding"
,
534 title = "Re
: Yet another block cipher
: {Storin
}"
,
535 howpublished = "Usenet article in \texttt
{sci.crypt
}"
,
537 note = "Message
-id
{\msgid
{<slrn8iqhaq
.872.mdw@mull.ncipher.com
>}}"
540 @Misc
{wooding
-2003:new
-proofs
-old
-modes
,
541 author = "Mark Wooding"
,
542 title = "New proofs for old modes"
,
543 howpublished = "Unpublished work in progress"
,
547 @Misc
{wooding
-2010:tripe
,
548 author = "Mark Wooding"
,
549 title = "Trivial IP Encryption
(TrIPE
): A simple
{VPN
}"
,
551 url
= "http
://git.distorted.org.uk
/~mdw
/tripe
/"
554 @Misc
{ylonen
-2001:ssh
-transport
-layer
,
555 author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and
557 title = "
{SSH
} Transport Layer Protocol"
,
558 howpublished = "Internet Draft"
,
561 url
= "http
://www.ietf.org
/internet
-drafts
/draft
-ietf
-secsh
-transport
-09.txt"
564 %%%--------------------------------------------------------------------------
565 %%% Proceedings volumes.
567 @Proceedings
{DBLP
:conf
/africacrypt
/2009,
568 title = "Progress in Cryptology
- AFRICACRYPT
2009, Second
569 International Conference on Cryptology in Africa
,
570 Gammarth
, Tunisia
, June
21-25, 2009. Proceedings"
,
572 booktitle = "AFRICACRYPT"
,
573 editor = "Bart Preneel"
,
575 series = "Lecture Notes in Computer Science"
,
576 publisher = "Springer"
,
577 isbn
= "
978-3-642-02383-5"
,
578 ee
= "http
://dx.doi.org
/10.1007/978-3-642-02384-2"
,
579 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
582 @Proceedings
{DBLP
:conf
/eurocrypt
/2008,
583 title = "Advances in Cryptology
- EUROCRYPT
2008, 27th Annual
584 International Conference on the Theory and Applications of
585 Cryptographic Techniques
, Istanbul
, Turkey
, April
13-17,
588 booktitle = "EUROCRYPT"
,
589 editor = "Nigel P. Smart"
,
591 series = "Lecture Notes in Computer Science"
,
592 publisher = "Springer"
,
593 isbn
= "
978-3-540-78966-6"
,
594 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
597 @Proceedings
{DBLP
:conf
/fse
/2001,
598 title = "Fast Software Encryption
, 8th International Workshop
, FSE
599 2001 Yokohama
, Japan
, April
2-4, 2001, Revised Papers"
,
602 editor = "Mitsuru Matsui"
,
604 series = "Lecture Notes in Computer Science"
,
605 publisher = "Springer"
,
606 isbn
= "
3-540-43869-6"
,
607 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
610 @Proceedings
{DBLP
:conf
/fse
/2005,
611 title = "Fast Software Encryption
: 12th International Workshop
,
612 {FSE
} 2005, Paris
, France
, February
21-23, 2005, Revised
615 editor = "Henri Gilbert and Helena Handschuh"
,
617 series = "Lecture Notes in Computer Science"
,
618 publisher = "Springer"
,
619 url
= "https
://doi.org
/10.1007/b137506"
,
620 doi
= "
10.1007/b137506"
,
621 isbn
= "
3-540-26541-4"
,
622 timestamp
= "Tue
, 30 May
2017 16:36:53 +0200"
,
623 biburl
= "http
://dblp.uni
-trier.de
/rec
/bib
/conf
/fse
/2005"
,
624 bibsource
= "dblp computer science bibliography
, http
://dblp.org"
627 @Proceedings
{DBLP
:conf
/indocrypt
/2004,
628 title = "Progress in Cryptology
- INDOCRYPT
2004, 5th International
629 Conference on Cryptology in India
, Chennai
, India
,
630 December
20-22, 2004, Proceedings"
,
632 booktitle = "INDOCRYPT"
,
633 editor = "Anne Canteaut and Kapalee Viswanathan"
,
635 series = "Lecture Notes in Computer Science"
,
636 publisher = "Springer"
,
637 isbn
= "
3-540-24130-2"
,
638 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
641 @Proceedings
{DBLP
:conf
/pkc
/2006,
642 title = "Public Key Cryptography
- {PKC
} 2006, 9th International
643 Conference on Theory and Practice of Public
-Key
644 Cryptography
, New York
, NY
, USA
, April
24-26, 2006,
647 editor = "Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal
650 series = "Lecture Notes in Computer Science"
,
651 publisher = "Springer"
,
652 url
= "https
://doi.org
/10.1007/11745853"
,
653 doi
= "
10.1007/11745853"
,
654 isbn
= "
3-540-33851-9"
,
655 timestamp
= "Tue
, 30 May
2017 16:36:52 +0200"
,
656 biburl
= "http
://dblp.uni
-trier.de
/rec
/bib
/conf
/pkc
/2006"
,
657 bibsource
= "dblp computer science bibliography
, http
://dblp.org"
660 @Proceedings
{DBLP
:conf
/wpes
/2004,
661 title = "Proceedings of the
2004 ACM Workshop on Privacy in the
662 Electronic Society
, WPES
2004, Washington
, DC
, USA
,
666 editor = "Vijay Atluri and Paul F. Syverson and Sabrina De Capitani
669 isbn
= "
1-58113-968-3"
,
670 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
673 @Proceedings
{DBLP
:conf
/wpes
/2007,
674 title = "Proceedings of the
2007 ACM Workshop on Privacy in the
675 Electronic Society
, WPES
2007, Alexandria
, VA
, USA
,
679 editor = "Peng Ning and Ting Yu"
,
681 isbn
= "
978-1-59593-883-1"
,
682 bibsource
= "DBLP
, http
://dblp.uni
-trier.de"
685 %%%--------------------------------------------------------------------------
689 %%% bibtex-maintain-sorted-entries: entry-class
690 %%% bibtex-sort-entry-class: (("String") (catch-all) ("Proceedings"))