mdw-crypto.bib: Reformat, sort, change the keys, and add many new entries.
[doc/texmf] / mdw-crypto.bib
1 %%% mdw's bibliography
2
3 %%%--------------------------------------------------------------------------
4 %%% Initial hacking.
5
6 @Preamble {
7 "
8 \ifx\url\undefined\let\url\texttt\fi
9 \ifx\msgid\undefined\let\msgid\texttt\fi
10 \let\mdwxxthebibliography\thebibliography
11 \def\thebibliography{\mdwxxbibhook\mdwxxthebibliography}
12 \def\mdwxxurl#1{[#1]}
13 \def\biburl{\bgroup\catcode`\#12\relax\biburlx}
14 \def\biburlx#1{\let\biburlsep\empty\biburlxi#1;;\done\egroup}
15 \def\biburlxi#1;{\def\temp{#1}\ifx\temp\empty\expandafter\biburlxiii\else
16 \biburlxii#1,,\done\let\biburlxafter\biburlxi\expandafter\biburlxmunch\fi}
17 \def\biburlxii#1,{\def\temp{#1}\ifx\temp\empty\expandafter\biburlxiii\else
18 \biburlsep\mdwxxurl{#1}\def\biburlsep{, }\let\biburlxafter\biburlxii
19 \expandafter\biburlxmunch\fi}
20 \def\biburlxiii#1\done{}
21 \def\biburlxmunch{\futurelet\next\biburlxmunchi}
22 \def\biburlxmunchi{\expandafter\ifx\space\next\expandafter\biburlxmunchii
23 \else\expandafter\biburlxafter\fi}
24 \expandafter\def\expandafter\biburlxmunchii\space{\biburlxmunch}
25 \def\mdwxxbibhook{\let\mdwxxurl\url\let\url\biburl}
26 "
27 }
28
29 @String{j-J-CRYPTOLOGY = "Journal of Cryptology: the journal of the International Association for Cryptologic Research"}
30
31 %%%--------------------------------------------------------------------------
32 %%% The main bibliography.
33
34 @InProceedings{abdalla-2001:dhies,
35 author = "Michel Abdalla and Mihir Bellare and Phillip Rogaway",
36 title = "{DHIES}: An Encryption Scheme Based on the
37 {Diffie--Hellman} Problem",
38 year = 2001,
39 crossref = "Naccache:2001:TCC",
40 url = "http://www-cse.ucsd.edu/users/mihir/papers/dhies.html"
41 }
42
43 @InProceedings{alexander-goldberg-2007:improved-user-authn-otr,
44 author = "Chris Alexander and Ian Goldberg",
45 title = "Improved user authentication in off-the-record messaging",
46 booktitle = "WPES",
47 year = 2007,
48 pages = "41--47",
49 ee = "http://doi.acm.org/10.1145/1314333.1314340",
50 url = "http://www.cypherpunks.ca/~iang/pubs/impauth.pdf",
51 crossref = "DBLP:conf/wpes/2007",
52 bibsource = "DBLP, http://dblp.uni-trier.de"
53 }
54
55 @InProceedings{bellare-1994:security-cbc,
56 author = "Mihir Bellare and Joe Kilian and Phillip Rogaway",
57 title = "The Security of Cipher Block Chaining",
58 booktitle = "{Advances in cryptology, {CRYPTO '94}: 14th annual
59 international cryptology conference, Santa Barbara,
60 California, {USA}, August 21--25, 1994: proceedings}",
61 year = 1994,
62 editor = "Yvo G. Desmedt",
63 volume = 839,
64 series = "Lecture Notes in Computer Science",
65 pages = "341--358",
66 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
67 publisher = "Spring{\-}er-Ver{\-}lag",
68 doi = "????",
69 isbn = "3-540-58333-5 (Berlin), 0-387-58333-5 (New York)",
70 issn = "0302-9743 (print), 1611-3349 (electronic)",
71 url =
72 "http://link.springer-ny.com/link/service/series/0558/bibs/0839/08390341.htm"
73 }
74
75 @InProceedings{bellare-1995:xor-macs,
76 author = "Mihir Bellare and Roch Gu{\'e}rin and Phillip Rogaway",
77 title = "{XOR MACs}: New methods for message authentication using
78 finite pseudorandom functions",
79 booktitle = "{Advances in cryptology, {CRYPTO '95}: 15th Annual
80 International Cryptology Conference, Santa Barbara,
81 California, {USA}, August 27--31, 1995: proceedings}",
82 year = 1995,
83 editor = "Don Coppersmith",
84 volume = 963,
85 series = "Lecture Notes in Computer Science",
86 pages = "15--35",
87 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
88 publisher = "Spring{\-}er-Ver{\-}lag",
89 note = "Sponsored by the International Association for Cryptologic
90 Research (IACR), in cooperation with the IEEE Computer
91 Society Technical Committee on Security and Privacy.",
92 doi = "????",
93 isbn = "3-540-60221-6 (Berlin)",
94 issn = "0302-9743 (print), 1611-3349 (electronic)",
95 url =
96 "http://link.springer-ny.com/link/service/series/0558/tocs/t0963.htm"
97 }
98
99 @InProceedings{bellare-1996:hmac,
100 author = "Mihir Bellare and Ran Canetti and Hugo Krawczyk",
101 title = "Keying Hash Functions for Message Authentication",
102 booktitle = "{Advances in cryptology, {CRYPTO '96}: 16th annual
103 international cryptology conference, Santa Barbara,
104 California, {USA}, August 18--22, 1996: proceedings}",
105 year = 1996,
106 editor = "Neal Koblitz",
107 volume = 1109,
108 series = "Lecture Notes in Computer Science",
109 pages = "1--15",
110 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
111 publisher = "Spring{\-}er-Ver{\-}lag",
112 note = "Sponsored by the International Association for Cryptologic
113 Research (IACR), in cooperation with the IEEE Computer
114 Society Technical Committee on Security and Privacy and
115 the Computer Science Department of the University of
116 California at Santa Barbara (UCSB).",
117 annote = "``Sponsored by the International Association for
118 Cryptologic Research (IACR), in cooperation with the IEEE
119 Computer Society Technical Committee on Security and
120 Privacy and the Computer Science Department of the
121 University of California at Santa Barbara (UCSB)''",
122 doi = "????",
123 isbn = "3-540-61512-1",
124 issn = "0302-9743 (print), 1611-3349 (electronic)",
125 url = "http://www.research.ibm.com/security/"
126 }
127
128 @InProceedings{bellare-1997:concrete-symmetric,
129 author = "M. Bellare and A. Desai and E. Jokipii and P. Rogaway",
130 title = "A concrete security treatment of symmetric encryption",
131 booktitle = "38th Annual Symposium on Foundations of Computer Science:
132 October 20--22, 1997, Miami Beach, Florida",
133 year = 1997,
134 editor = "{IEEE}",
135 pages = "394--403",
136 address = "1109 Spring Street, Suite 300, Silver Spring, MD 20910,
137 USA",
138 publisher = "IEEE Computer Society Press",
139 note = "IEEE catalog number 97CB36150. IEEE Computer Society Press
140 order number PR08197.",
141 key = "IEEE-FOCS'97",
142 isbn = "0-8186-8197-7 (paperback), 0-8186-8198-5 (casebound),
143 0-8186-8199-3 (microfiche)",
144 issn = "0272-5428"
145 }
146
147 @InProceedings{bellare-1998:modular-key-exchange,
148 author = "Mihir Bellare and Ran Canetti and Hugo Krawczyk",
149 title = "A modular approach to the design and analysis of
150 authentication and key exchange protocols (extended
151 abstract)",
152 booktitle = "Proceedings of the thirtieth annual {ACM} Symposium on
153 Theory of Computing: Dallas, Texas, May 23--26, 1998",
154 year = 1998,
155 editor = "{ACM}",
156 pages = "419--428",
157 address = "New York, NY, USA",
158 publisher = "ACM Press",
159 note = "ACM order number 508980.",
160 isbn = "0-89791-962-9",
161 url =
162 "http://www.acm.org/pubs/citations/proceedings/stoc/276698/p419-bellare/"
163 }
164
165 @Article{bellare-1998:pub-enc-notions,
166 author = "Mihir Bellare and Anand Desai and David Pointcheval and
167 Phillip Rogaway",
168 title = "Relations Among Notions of Security for Public-Key
169 Encryption Schemes",
170 journal = "Lecture Notes in Computer Science",
171 year = 1998,
172 volume = 1462,
173 pages = "26--??",
174 issn = "0302-9743 (print), 1611-3349 (electronic)",
175 url =
176 "http://link.springer-ny.com/link/service/series/0558/bibs/1462/14620026.htm"
177 }
178
179 @Article{bellare-1999:practice-oriented-provable-security,
180 author = "M. Bellare",
181 title = "Practice-Oriented Provable Security",
182 journal = "Lecture Notes in Computer Science",
183 year = 1999,
184 volume = 1561,
185 pages = "1--15",
186 issn = "0302-9743 (print), 1611-3349 (electronic)"
187 }
188
189 @InProceedings{bellare-2004:eax,
190 author = "Mihir Bellare and Phillip Rogaway and David Wagner",
191 title = "The {EAX} Mode of Operation",
192 year = 2004,
193 editor = "Bimal K. Roy and Willi Meier",
194 volume = 3017,
195 series = "Lecture Notes in Computer Science",
196 pages = "389--407",
197 publisher = "Springer",
198 bibdate = "2004-07-29",
199 bibsource = "DBLP,
200 http://dblp.uni-trier.de/db/conf/fse/fse2004.html#BellareRW04",
201 booktitle = "Fast Software Encryption, 11th International Workshop,
202 {FSE} 2004, Delhi, India, February 5-7, 2004, Revised
203 Papers",
204 isbn = "3-540-22171-9",
205 url = "http://www.cs.berkeley.edu/~daw/papers/eax-fse04.ps"
206 }
207
208 @InCollection{bellare-namprempre-2000:authn-enc-notions,
209 author = "Mihir Bellare and Chanathip Namprempre",
210 title = "Authenticated Encryption: Relations among Notions and
211 Analysis of the Generic Composition Paradigm",
212 booktitle = "Advances in cryptology---ASIACRYPT 2000 (Kyoto)",
213 publisher = "Spring{\-}er-Ver{\-}lag",
214 year = 2000,
215 volume = 1976,
216 series = "Lecture Notes in Comput. Sci.",
217 pages = "531--545",
218 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
219 url =
220 "http://link.springer-ny.com/link/service/series/0558/bibs/1976/19760531.htm"
221 }
222
223 @InProceedings{bellare-rogaway-1993:random-oracles,
224 author = "Mihir Bellare and Phillip Rogaway",
225 title = "Random oracles are practical",
226 booktitle = "Proceedings of the First Annual Conference on Computer and
227 Communications Security",
228 year = 1993,
229 pages = "62--73",
230 organization = "{ACM}",
231 url = "http://www-cse.ucsd.edu/users/mihir/papers/ro.html"
232 }
233
234 @InProceedings{bellare-rogaway-1994:entity-authn-key-distrib,
235 author = "Mihir Bellare and Phillip Rogaway",
236 title = "Entity Authentication and Key Distribution",
237 booktitle = "{Advances in cryptology, {CRYPTO '94}: 14th annual
238 international cryptology conference, Santa Barbara,
239 California, {USA}, August 21--25, 1994: proceedings}",
240 year = 1994,
241 editor = "Yvo G. Desmedt",
242 volume = 839,
243 series = "Lecture Notes in Computer Science",
244 pages = "232--249",
245 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
246 publisher = "Spring{\-}er-Ver{\-}lag",
247 doi = "????",
248 isbn = "3-540-58333-5 (Berlin), 0-387-58333-5 (New York)",
249 issn = "0302-9743 (print), 1611-3349 (electronic)",
250 url = "http://link.springer-ny.com/link/service/series/0558/bibs/0773/07730232.htm"
251 }
252
253 @InProceedings{bellare-rogaway-1995:oaep,
254 author = "M. Bellare and P. Rogaway",
255 title = "Optimal asymmetric encryption: How to Encrypt with {RSA}",
256 booktitle = "Advances in cryptology --- {EUROCRYPT} '94: Workshop on
257 the Theory and Application of Cryptographic Techniques,
258 Perugia, Italy, May 9--12, 1994: proceedings",
259 year = 1995,
260 editor = "Alfredo {De Santis}",
261 volume = 950,
262 series = "Lecture Notes in Computer Science",
263 pages = "92--111",
264 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
265 publisher = "Spring{\-}er-Ver{\-}lag",
266 isbn = "3-540-60176-7",
267 issn = "0302-9743 (print), 1611-3349 (electronic)",
268 url =
269 "http://link.springer-ny.com/link/service/series/0558/bibs/0950/09500092.htm"
270 }
271
272 @InProceedings{bellare-rogaway-1995:session-key-distrib,
273 author = "Mihir Bellare and Phillip Rogaway",
274 title = "Provably secure session key distribution: the three party
275 case",
276 booktitle = "Proceedings of the twenty-seventh annual {ACM} Symposium
277 on Theory of Computing: Las Vegas, Nevada, May 29--June 1,
278 1995",
279 year = 1995,
280 editor = "{ACM}",
281 pages = "57--66",
282 address = "New York, NY, USA",
283 publisher = "ACM Press",
284 note = "ACM order no. 508950.",
285 isbn = "0-89791-718-9",
286 url = "http://www.acm.org/pubs/citations/proceedings/stoc/225058/p57-bellare/"
287 }
288
289 @Article{bellare-rogaway-1996:exact-security-sigs,
290 author = "Mihir Bellare and Phillip Rogaway",
291 title = "The exact security of digital signatures --- how to sign
292 with {RSA} and {Rabin}",
293 journal = "Lecture Notes in Computer Science",
294 year = 1996,
295 volume = 1070,
296 pages = "399--??",
297 issn = "0302-9743 (print), 1611-3349 (electronic)",
298 url = "http://link.springer-ny.com/link/service/series/0558/bibs/1070/10700399.htm"
299 }
300
301 @Misc{bellare-rogaway-2004:triple-enc-eprint,
302 author = "Mihir Bellare and Phillip Rogaway",
303 title = "Code-Based Game-Playing Proofs and the Security of Triple
304 Encryption",
305 howpublished = "Cryptology ePrint Archive, Report 2004/331",
306 year = 2004,
307 url = "http://eprint.iacr.org/2004/331"
308 }
309
310 @InProceedings{bellare-rogaway-2006:triple-enc,
311 author = "Mihir Bellare and Phillip Rogaway",
312 title = "The Security of Triple Encryption and a Framework for
313 Code-Based Game-Playing Proofs",
314 booktitle = "Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual
315 International Conference on the Theory and Applications of
316 Cryptographic Techniques, St. Petersburg, Russia, May 28 -
317 June 1, 2006, Proceedings",
318 year = 2006,
319 editor = "Serge Vaudenay",
320 volume = 4004,
321 series = "Lecture Notes in Computer Science",
322 pages = "409--426",
323 publisher = "Springer",
324 note = "Proceedings version of
325 \cite{bellare-rogaway-2004:triple-enc-eprint}",
326 bibdate = "2006-07-05",
327 bibsource = "DBLP, http://dblp.uni-trier.de/db/conf/eurocrypt/eurocrypt2006.html#BellareR06",
328 isbn = "3-540-34546-9"
329 }
330
331 @InProceedings{bernstein-2005:poly1305,
332 author = "Daniel J. Bernstein",
333 title = "The Poly1305-AES Message-Authentication Code",
334 booktitle = "Fast Software Encryption: 12th International Workshop,
335 {FSE} 2005, Paris, France, February 21-23, 2005, Revised
336 Selected Papers",
337 year = 2005,
338 pages = "32--49",
339 crossref = "DBLP:conf/fse/2005",
340 url = "https://doi.org/10.1007/11502760_3",
341 doi = "10.1007/11502760_3",
342 timestamp = "Tue, 30 May 2017 16:36:53 +0200",
343 biburl = "http://dblp.uni-trier.de/rec/bib/conf/fse/Bernstein05",
344 bibsource = "dblp computer science bibliography, http://dblp.org"
345 }
346
347 @Misc{bernstein-2005:salsa20,
348 author = "Daniel J. Bernstein",
349 title = "{Salsa20} Specification",
350 howpublished = "Submission to the ECRYPT Stream Cipher project (eSTREAM)",
351 month = apr,
352 year = 2005,
353 url = "https://cr.yp.to/snuffle/spec.pdf"
354 }
355
356 @InProceedings{bernstein-2006:curve25519,
357 author = "Daniel J. Bernstein",
358 title = "Curve25519: New Diffie-Hellman Speed Records",
359 booktitle = "Public Key Cryptography - {PKC} 2006, 9th International
360 Conference on Theory and Practice of Public-Key
361 Cryptography, New York, NY, USA, April 24-26, 2006,
362 Proceedings",
363 year = 2006,
364 pages = "207--228",
365 crossref = "DBLP:conf/pkc/2006",
366 url = "https://cr.yp.to/papers.html#curve25519",
367 doi = "10.1007/11745853_14",
368 timestamp = "Tue, 30 May 2017 16:36:52 +0200",
369 biburl = "http://dblp.uni-trier.de/rec/bib/conf/pkc/Bernstein06",
370 bibsource = "dblp computer science bibliography, http://dblp.org"
371 }
372
373 @Article{blake-wilson-1997:key-agreement,
374 author = "S. Blake-Wilson and D. Johnson and A. Menezes",
375 title = "Key Agreement Protocols and Their Security Analysis",
376 journal = "Lecture Notes in Computer Science",
377 year = 1997,
378 volume = 1355,
379 pages = "30--??",
380 issn = "0302-9743 (print), 1611-3349 (electronic)"
381 }
382
383 @Article{blake-wilson-menezes-1998:asymm-key-transport,
384 author = "S. Blake-Wilson and A. Menezes",
385 title = "Entity Authentication and Authenticated Key Transport
386 Protocols Employing Asymmetric Techniques",
387 journal = "Lecture Notes in Computer Science",
388 year = 1998,
389 volume = 1361,
390 pages = "137--??",
391 issn = "0302-9743 (print), 1611-3349 (electronic)"
392 }
393
394 @Article{boneh-1998:ddh,
395 author = "D. Boneh",
396 title = "The Decision {Diffie--Hellman} Problem",
397 journal = "Lecture Notes in Computer Science",
398 year = 1998,
399 volume = 1423,
400 pages = "48--63",
401 issn = "0302-9743 (print), 1611-3349 (electronic)",
402 url = "http://theory.stanford.edu/~dabo/papers/DDH.ps.gz"
403 }
404
405 @Article{boneh-franklin-2003:ibe-weil-pairing,
406 author = "Dan Boneh and Matthew Franklin",
407 title = "Identity-Based Encryption from the {Weil} Pairing",
408 journal = "SIAM Journal on Computing",
409 year = 2003,
410 volume = 32,
411 number = 3,
412 pages = "586--615",
413 month = jun,
414 doi = "https://doi.org/10.1137/S0097539701398521",
415 issn = "0097-5397 (print), 1095-7111 (electronic)",
416 url = "http://epubs.siam.org/sam-bin/dbq/article/39852"
417 }
418
419 @InProceedings{borisov-2004:off-the-record,
420 author = "Nikita Borisov and Ian Goldberg and Eric A. Brewer",
421 title = "Off-the-record communication, or, why not to use PGP",
422 booktitle = "WPES",
423 year = 2004,
424 pages = "77--84",
425 ee = "http://doi.acm.org/10.1145/1029179.1029200",
426 url = "http://www.cypherpunks.ca/otr/otr-wpes.pdf",
427 crossref = "DBLP:conf/wpes/2004",
428 bibsource = "DBLP, http://dblp.uni-trier.de"
429 }
430
431 @InProceedings{brassard-crepeau-1989:sorting-zero-knowledge,
432 author = "Gilles Brassard and Claude Crepeau",
433 title = "Sorting out Zero-Knowledge",
434 booktitle = "Theory and Application of Cryptographic Techniques",
435 year = 1989,
436 pages = "181--191",
437 url = "http://citeseer.nj.nec.com/brassard90sorting.html"
438 }
439
440 @TechReport{burrows-1989:logic-authn,
441 author = "Michael Burrows and Martin Abadi and Roger Needham",
442 title = "A Logic of Authentication",
443 institution = "Digital Equipment Corporation, Systems Research Centre",
444 year = 1989,
445 number = 39,
446 month = feb,
447 pages = 48,
448 abstract = "Questions of belief are essential in analyzing protocols
449 for authentication in distributed computing systems. In
450 this paper we motivate, set out, and exemplify a logic
451 specifically designed for this analysis; we show how
452 various protocols differ subtly with respect to the
453 required initial assumptions of the participants and their
454 final beliefs. Our formalism has enabled us to isolate and
455 express these differences with a precision that was not
456 previously possible. It has drawn attention to features of
457 protocols of which we and their authors were previously
458 unaware, and allowed us to suggest improvements to the
459 protocols. The reasoning about some protocols has been
460 mechanically verified. This paper starts with an informal
461 account of the problem, goes on to explain the formalism
462 to be used, and gives examples of its application to
463 protocols from the literature, both with conventional
464 shared-key cryptography and with public-key
465 cryptography. Some of the examples are chosen because of
466 their practical importance, while others serve to
467 illustrate subtle points of the logic and to explain how
468 we use it. We discuss extensions of the logic motivated by
469 actual practice -- for example, in order to account for
470 the use of hash functions in signatures. The final
471 sections contain a formal semantics of the logic and some
472 conclusions."
473 }
474
475 @Article{canetti-2000:security-and-composition,
476 author = "Ran Canetti",
477 title = "Security and Composition of Multiparty Cryptographic
478 Protocols",
479 journal = j-J-CRYPTOLOGY,
480 year = 2000,
481 volume = 13,
482 number = 1,
483 pages = "143--202",
484 coden = "JOCREQ",
485 issn = "0933-2790 (print), 1432-1378 (electronic)",
486 issn-l = "0933-2790",
487 bibdate = "Mon Oct 9 17:48:14 MDT 2000",
488 bibsource = "http://link.springer.de/link/service/journals/00145/tocs/t0013001.html;
489 http://www.math.utah.edu/pub/tex/bib/jcryptology.bib",
490 url = "http://link.springer.de/link/service/journals/00145/bibs/0013001/00130143.html",
491 acknowledgement= ack-nhfb,
492 journal-url = "http://link.springer.com/journal/145"
493 }
494
495 @InProceedings{canetti-2001:uc-security,
496 author = "R. Canetti",
497 title = "{Universally Composable} security: a new paradigm for
498 cryptographic protocols",
499 booktitle = "{42nd IEEE Symposium on Foundations of Computer Science:
500 proceedings: October 14--17, 2001, Las Vegas, Nevada,
501 USA}",
502 year = 2001,
503 editor = "{IEEE}",
504 pages = "136--145",
505 address = "1109 Spring Street, Suite 300, Silver Spring, MD 20910,
506 USA",
507 publisher = "IEEE Computer Society Press",
508 isbn = "0-7695-1390-5, 0-7695-1391-3 (case), 0-7695-1392-1
509 (microfiche)",
510 issn = "0272-5428"
511 }
512
513 @TechReport{canetti-2001:uc-security-eprint,
514 author = "Ran Canetti",
515 title = "{Universally Composable} Security: a New Paradigm for
516 Cryptographic Protocols",
517 institution = "Cryptology {ePrint} Archive",
518 year = 2001,
519 type = "Report",
520 number = "2000/067",
521 month = oct,
522 note = "Extended Abstract appeared in proceedings of the 42nd
523 Symposium on Foundations of Computer Science (FOCS), 2001",
524 annote = "Revised version of
525 \cite{canetti-2000:security-and-composition}.",
526 added-by = "sti",
527 url = "http://eprint.iacr.org/2000/067",
528 abstract = "We propose a new paradigm for defining security of
529 cryptographic protocols, called {\sf universally
530 composable security.} The salient property of universally
531 composable definitions of security is that they guarantee
532 security even when a secure protocol is composed with an
533 arbitrary set of protocols, or more generally when the
534 protocol is used as a component of an arbitrary
535 system. This is an essential property for maintaining
536 security of cryptographic protocols in complex and
537 unpredictable environments such as the Internet. In
538 particular, universally composable definitions guarantee
539 security even when an unbounded number of protocol
540 instances are executed concurrently in an adversarially
541 controlled manner, they guarantee non-malleability with
542 respect to arbitrary protocols, and more. We show how to
543 formulate universally composable definitions of security
544 for practically any cryptographic task. Furthermore, we
545 demonstrate that practically any such definition can be
546 realized using known general techniques, as long as only a
547 minority of the participants are corrupted. We then
548 proceed to formulate universally composable definitions of
549 a wide array of cryptographic tasks, including
550 authenticated and secure communication, key-exchange,
551 public-key encryption, signature, commitment, oblivious
552 transfer, zero-knowledge, and more. We also make initial
553 steps towards studying the realizability of the proposed
554 definitions in other natural settings.",
555 keywords = "foundations / cryptographic protocols, security analysis
556 of protocols, concurrent composition",
557 added-at = "Wed Oct 17 16:02:37 2001"
558 }
559
560 @Article{canetti-2004:rand-oracle-revisit,
561 author = "Ran Canetti and Oded Goldreich and Shai Halevi",
562 title = "The random oracle methodology, revisited",
563 journal = "Journal of the ACM",
564 year = 2004,
565 volume = 51,
566 number = 4,
567 pages = "557--594",
568 month = jul,
569 issn = "0004-5411 (print), 1557-735X (electronic)"
570 }
571
572 @Article{canetti-krawczyk-2001:secure-channels,
573 author = "Ran Canetti and Hugo Krawczyk",
574 title = "Analysis of Key-Exchange Protocols and Their Use for
575 Building Secure Channels",
576 journal = "Lecture Notes in Computer Science",
577 year = 2001,
578 volume = 2045,
579 pages = "453--??",
580 issn = "0302-9743 (print), 1611-3349 (electronic)",
581 url = "http://link.springer-ny.com/link/service/series/0558/bibs/2045/20450453.htm"
582 }
583
584 @Misc{canetti-krawczyk-2001:secure-channels-eprint,
585 author = "Ran Canetti and Hugo Krawczyk",
586 title = "Analysis of Key-Exchange Protocols and Their Use for
587 Building Secure Channels",
588 howpublished = "Cryptology ePrint Archive, Report 2001/040",
589 year = 2001,
590 url = "http://eprint.iacr.org/2001/040"
591 }
592
593 @Article{canetti-krawczyk-2002:uc-key-exchange,
594 author = "Ran Canetti and Hugo Krawczyk",
595 title = "Universally Composable Notions of Key Exchange and Secure
596 Channels",
597 journal = "Lecture Notes in Computer Science",
598 year = 2002,
599 volume = 2332,
600 pages = "337--??",
601 issn = "0302-9743 (print), 1611-3349 (electronic)",
602 url = "http://link.springer-ny.com/link/service/series/0558/bibs/2332/23320337.htm"
603 }
604
605 @Misc{certicom-2000:sec1,
606 author = "{Certicom Research}",
607 title = "Standards for Efficient Cryptography, {SEC} 1: {E}lliptic
608 curve cryptography, Version 1.0",
609 year = 2000,
610 url = "http://www.secg.org/download/aid-385/sec1_final.pdf"
611 }
612
613 @PhdThesis{daemen-1995:cipher-hash-design,
614 author = "Joan Daemen",
615 title = "Cipher and hash function design strategies based on linear
616 and differential cryptanalysis",
617 school = "K. U. Leuven",
618 year = 1995
619 }
620
621 @Manual{dworkin-2010:cbc-ciphertext-stealing,
622 title = "Recommendation for Block Cipher Modes of Operation: Three
623 Variants of Ciphertext Stealing for CBC Mode",
624 author = "Morris Dworkin",
625 organization = pub-NIST,
626 address = pub-NIST:adr,
627 month = oct,
628 year = 2010,
629 note = "Addendum to NIST Special Publication 800-38A",
630 pages = "iv + 7",
631 url = "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a-add.pdf"
632 }
633
634 @InProceedings{elgamal-1985:dlog-enc-sign,
635 author = "Taher ElGamal",
636 title = "A Public Key Cryptosystem and a Signature Scheme Based on
637 Discrete Logarithms",
638 booktitle = "{Advances in Cryptology: Proceedings of CRYPTO 84}",
639 year = 1985,
640 editor = "George Robert Blakley and David Chaum",
641 volume = 196,
642 series = "Lecture Notes in Computer Science",
643 pages = "10--18",
644 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
645 publisher = "Spring{\-}er-Ver{\-}lag",
646 note = "CRYPTO 84: a Workshop on the Theory and Application of
647 Cryptographic Techniques, held at the University of
648 California, Santa Barbara, August 19--22, 1984, sponsored
649 by the International Association for Cryptologic
650 Research.",
651 doi = "https://doi.org/10.1007/3-540-39568-7",
652 isbn = "0-387-15658-5; 3-540-39568-7",
653 issn = "0302-9743 (print), 1611-3349 (electronic)",
654 url =
655 "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=10"
656 }
657
658 @Misc{ellis-1997:non-secret-enc,
659 author = "James Ellis",
660 title = "The Story of Non-Secret Encryption",
661 howpublished = "CESG internal document",
662 month = dec,
663 year = 1997,
664 note = "Released internally in 1987.",
665 url = "http://www.jya.com/ellisdoc.htm"
666 }
667
668 @Misc{ferguson-2005:gcm-authn-weakness,
669 author = "Niels Ferguson",
670 title = "Authentication Weaknesses in {GCM}",
671 month = "May",
672 year = 2005,
673 note = "Public comment to NIST",
674 url = "http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/CWC-GCM/Ferguson2.pdf"
675 }
676
677 @Misc{fisher-2000:storin-usenet,
678 author = "Matthew Fisher",
679 title = "Re: Yet another block cipher: {Storin}",
680 howpublished = "Usenet article in {\texttt{sci.crypt}}",
681 year = 2000,
682 note = "Message-id {\msgid{<8gjctn\$9ct\$1@nnrp1.deja.com>}}"
683 }
684
685 @Misc{goldwasser-bellare-1999:lecture-notes-crypto,
686 author = "Shafi Goldwasser and Mihir Bellare",
687 title = "Lecture Notes on Cryptography",
688 howpublished = "Summer Course ``Cryptography and Computer Security'' at
689 MIT, 1996--1999",
690 year = 1999,
691 url = "http://citeseer.nj.nec.com/goldwasser96lecture.html"
692 }
693
694 @InProceedings{groth-sahai-2008:proofs-for-bilinear-groups,
695 author = "Jens Groth and Amit Sahai",
696 title = "Efficient Non-interactive Proof Systems for Bilinear
697 Groups",
698 booktitle = "EUROCRYPT",
699 year = 2008,
700 pages = "415--432",
701 ee = "http://dx.doi.org/10.1007/978-3-540-78967-3_24",
702 crossref = "DBLP:conf/eurocrypt/2008",
703 bibsource = "DBLP, http://dblp.uni-trier.de"
704 }
705
706 @Manual{ieee-2000:1363,
707 title = "IEEE 1363-2000: Standard Specifications for Public Key
708 Cryptography",
709 author = "{IEEE}",
710 organization = "Microprocessor Standards Committee of the IEEE Computer
711 Society, USA",
712 year = 2000,
713 isbn = "0-7381-1956-3",
714 abstract = "This standard specifies common public-key cryptographic
715 techniques, including mathematical primitives for secret
716 value (key) derivation, public-key encryption, and digital
717 signatures, and cryptographic schemes based on those
718 primitives. It also specifies related cryptographic
719 parameters, public keys and private keys. The purpose of
720 this standard is to provide a reference for specifications
721 of a variety of techniques from which applications may
722 select."
723 }
724
725 @Manual{ieee-2004:1363a,
726 title = "{IEEE} 1363a-2004: Standard Specifications for Public Key
727 Cryptography -- Amendment 1: Additional Techniques",
728 author = "{IEEE}",
729 organization = "Microprocessor Standards Committee of the IEEE Computer
730 Society, USA",
731 year = 2004,
732 note = "Amendment to \cite{ieee-2000:1363}.",
733 isbn = "0-7381-4003-1",
734 abstract = "Amendment to IEEE Std 1363-2000. This standard specifies
735 additional public-key cryptographic techniques beyond
736 those in IEEE Std 1363-2000. It is intended to be merged
737 with IEEE Std 1363-2000 during future revisions."
738 }
739
740 @PhdThesis{jackson-1997:who-goes-there,
741 author = "Ian Jackson",
742 title = "Who goes there? Location confidentiality through
743 anonymity",
744 school = "Cambridge University Computer Laboratory",
745 year = 1997,
746 pages = "vi + 97",
747 url = "http://www.chiark.greenend.org.uk/~ijackson/thesis/"
748 }
749
750 @Misc{koblitz-menezes-2006:another-look-provable-security-ii,
751 author = "Neal Koblitz and Alfred Menezes",
752 title = "Another Look at ``Provable Security'' II",
753 howpublished = "Cryptology ePrint Archive, Report 2006/229",
754 year = 2006,
755 url = "http://eprint.iacr.org/2006/229"
756 }
757
758 @TechReport{kocher-1996:ssl3,
759 author = "A. Frier and P. Karlton and P. Kocher",
760 title = "The {SSL 3.0} Protocol",
761 institution = "Netscape Communications Corp.",
762 year = 1996,
763 month = nov,
764 url = "http://home.netscape.com/eng/ssl3/ssl-toc.html"
765 }
766
767 @Misc{kohno-2003:cwc,
768 author = "Tadayoshi Kohno and John Viega and Doug Whiting",
769 title = "The CWC Authenticated Encryption (Associated Data) Mode",
770 howpublished = "Cryptology ePrint Archive, Report 2003/106",
771 year = 2003,
772 url = "http://eprint.iacr.org/2003/106"
773 }
774
775 @InProceedings{krawczyk-2001:order-enc-authn,
776 author = "Hugo Krawczyk",
777 title = "The Order of Encryption and Authentication for Protecting
778 Communications (or: How Secure Is {SSL}?)",
779 booktitle = "Advances in cryptology --- {CRYPTO} 2001: 21st Annual
780 International Cryptology Conference, Santa Barbara,
781 California, {USA}, August 19--23, 2001: proceedings",
782 year = 2001,
783 editor = "Joe Kilian",
784 volume = 2139,
785 series = "Lecture Notes in Computer Science",
786 pages = "310--??",
787 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
788 publisher = "Spring{\-}er-Ver{\-}lag",
789 isbn = "3-540-42456-3 (paperback)",
790 url =
791 "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390310.htm"
792 }
793
794 @InProceedings{maurer-2009:unify-proofs-of-knowledge,
795 author = "Ueli M. Maurer",
796 title = "Unifying Zero-Knowledge Proofs of Knowledge",
797 booktitle = "AFRICACRYPT",
798 year = 2009,
799 pages = "272-286",
800 ee = "http://dx.doi.org/10.1007/978-3-642-02384-2_17",
801 crossref = "DBLP:conf/africacrypt/2009",
802 bibsource = "DBLP, http://dblp.uni-trier.de"
803 }
804
805 @InProceedings{mcgrew-viega-2004:gcm-security-performance,
806 author = "David A. McGrew and John Viega",
807 title = "The Security and Performance of the Galois/Counter Mode
808 ({GCM}) of Operation",
809 booktitle = "Progress in Cryptology - {INDOCRYPT} 2004, 5th
810 International Conference on Cryptology in India, Chennai,
811 India, December 20-22, 2004, Proceedings",
812 year = 2004,
813 editor = "Anne Canteaut and Kapalee Viswanathan",
814 volume = 3348,
815 series = "Lecture Notes in Computer Science",
816 pages = "343--355",
817 publisher = "Springer",
818 bibdate = "2004-12-13",
819 bibsource = "DBLP, http://dblp.uni-trier.de/db/conf/indocrypt/indocrypt2004.html#McGrewV04",
820 isbn = "3-540-24130-2",
821 url = "http://eprint.iacr.org/2004/193"
822 }
823
824 @Misc{menezes-2005:intro-pairing-crypto,
825 author = "Alfred Menezes",
826 title = "An Introduction to Pairing-Based Cryptography",
827 year = 2005,
828 note = "Notes from lectures given in Santander, Spain",
829 url = "http://www.cacr.math.uwaterloo.ca/~ajmeneze/publications/pairings.pdf"
830 }
831
832 @Manual{nist-2005:cmac,
833 title = "Recommentation for Block Cipher Modes of Operation: The
834 {CMAC} Mode for Authentication",
835 author = "{NIST}",
836 organization = pub-NIST,
837 address = pub-NIST:adr,
838 month = may,
839 year = 2005,
840 volume = "SP~800-38\,B",
841 series = "Special Publications",
842 url = "http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf"
843 }
844
845 @Manual{nist-2008:triple-des,
846 title = "Recommendation for the {Triple Data Encryption Algorithm}
847 ({TDEA}) Block Cipher",
848 author = "{NIST}",
849 organization = pub-NIST,
850 address = pub-NIST:adr,
851 month = may,
852 year = 2008,
853 volume = "SP~800-67",
854 pages = "x + 30",
855 day = 19,
856 series = "Special Publications",
857 url = "http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf",
858 acknowledgement= ack-nhfb
859 }
860
861 @Misc{raimondo-2006:deniable-authn-key-exchange,
862 author = "Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk",
863 title = "Deniable Authentication and Key Exchange",
864 howpublished = "Cryptology ePrint Archive, Report 2006/280",
865 year = 2006,
866 url = "http://eprint.iacr.org/2006/280"
867 }
868
869 @Misc{rfc768,
870 author = "J. Postel",
871 title = "{User Datagram Protocol}",
872 howpublished = "RFC 768 (INTERNET STANDARD)",
873 month = aug,
874 year = 1980,
875 number = 768,
876 publisher = "IETF",
877 series = "Request for Comments",
878 url = "http://www.ietf.org/rfc/rfc768.txt"
879 }
880
881 @Misc{rfc793,
882 author = "J. Postel",
883 title = "{Transmission Control Protocol}",
884 howpublished = "RFC 793 (INTERNET STANDARD)",
885 month = sep,
886 year = 1981,
887 note = "Updated by RFCs 1122, 3168, 6093, 6528",
888 number = 793,
889 publisher = "IETF",
890 series = "Request for Comments",
891 url = "http://www.ietf.org/rfc/rfc793.txt"
892 }
893
894 @InProceedings{rogaway-2001:ocb,
895 author = "Phillip Rogaway and Mihir Bellare and John Black and Ted
896 Krovetz",
897 title = "{OCB}: a block-cipher mode of operation for efficient
898 authenticated encryption",
899 booktitle = "{ACM} Conference on Computer and Communications Security",
900 year = 2001,
901 pages = "196--205",
902 url = "http://www.cs.ucdavis.edu/~rogaway/ocb/"
903 }
904
905 @InProceedings{rogaway-2002:aead,
906 author = "Phillip Rogaway",
907 title = "Authenticated-encryption with associated-data",
908 booktitle = "Proceedings of the 9th {ACM} Conference on Computer and
909 Communications Security",
910 year = 2002,
911 editor = "Ravi Sandhu",
912 pages = "98--107",
913 month = nov,
914 address = "Washington, DC, USA",
915 publisher = "ACM Press",
916 added-by = "msteiner",
917 url = "http://www.cs.ucdavis.edu/~rogaway/papers/ad.html",
918 added-at = "Sun Nov 16 12:50:24 2003",
919 abstract = "When a message is transformed into a ciphertext in a way
920 designed to protect both its privacy and authenticity,
921 there may be additional information, such as a packet
922 header, that travels alongside the ciphertext (at least
923 conceptually) and must get authenticated with it. We
924 formalize and investigate this authenticated-encryption
925 with associated-data (AEAD) problem. Though the problem
926 has long been addressed in cryptographic practice, it was
927 never provided a definition or even a name. We do this,
928 and go on to look at efficient solutions for AEAD, both in
929 general and for the authenticated-encryption scheme
930 OCB. For the general setting we study two simple ways to
931 turn an authenticated-encryption scheme that does not
932 support associated-data into one that does: nonce stealing
933 and ciphertext translation. For the case of OCB we
934 construct an AEAD-scheme by combining OCB and the
935 pseudorandom function PMAC, using the same key for both
936 algorithms. We prove that, despite ``interaction'' between
937 the two schemes when using a common key, the combination
938 is sound. We also consider achieving AEAD by the generic
939 composition of a nonce-based, privacy-only encryption
940 scheme and a pseudorandom function."
941 }
942
943 @Book{schneier-1996:applied-crypto,
944 author = "Bruce Schneier",
945 title = "Applied Cryptography: Protocols, Algorithms, and Source
946 Code in {C}",
947 publisher = "John Wiley and Sons, Inc.",
948 year = 1996,
949 address = "New York, NY, USA",
950 edition = "Second",
951 pages = "xxiii + 758",
952 isbn = "0-471-12845-7 (cloth), 0-471-11709-9 (paper)",
953 url = "http://www.counterpane.com/applied.html"
954 }
955
956 @Article{shoup-1997:dh-lower-bounds,
957 author = "Victor Shoup",
958 title = "Lower Bounds for Discrete Logarithms and Related Problems",
959 journal = "Lecture Notes in Computer Science",
960 year = 1997,
961 volume = 1233,
962 pages = "256--??",
963 issn = "0302-9743 (print), 1611-3349 (electronic)",
964 url = "http://link.springer-ny.com/link/service/series/0558/bibs/1233/12330256.htm"
965 }
966
967 @Misc{shoup-1999:formal-model-key-exchange,
968 author = "Victor Shoup",
969 title = "On Formal Models for Secure Key Exchange ",
970 howpublished = "Cryptology ePrint Archive, Report 1999/012",
971 year = 1999,
972 url = "http://eprint.iacr.org/1999/012"
973 }
974
975 @InProceedings{shoup-2001:oaep-reconsidered,
976 author = "Victor Shoup",
977 title = "{OAEP} Reconsidered",
978 booktitle = "Advances in cryptology --- {CRYPTO} 2001: 21st Annual
979 International Cryptology Conference, Santa Barbara,
980 California, {USA}, August 19--23, 2001: proceedings",
981 year = 2001,
982 editor = "Joe Kilian",
983 volume = 2139,
984 series = "Lecture Notes in Computer Science",
985 pages = "239--259",
986 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
987 publisher = "Spring{\-}er-Ver{\-}lag",
988 isbn = "3-540-42456-3 (paperback)",
989 url = "http://link.springer-ny.com/link/service/series/0558/bibs/2139/21390239.htm"
990 }
991
992 @Unpublished{shoup-2001:proposal-iso-public-key,
993 author = "Victor Shoup",
994 title = "Proposal for an {ISO} Standard for Public Key Encryption
995 (Version 2.0)",
996 note = "Unpublished manuscript",
997 year = 2001,
998 url = "http://www.shoup.net/papers/"
999 }
1000
1001 @Misc{shoup-2004:sequences-of-games,
1002 author = "Victor Shoup",
1003 title = "Sequences of games: a tool for taming complexity in
1004 security proofs",
1005 howpublished = "Cryptology ePrint Archive, Report 2004/332",
1006 year = 2004,
1007 url = "http://eprint.iacr.org/2004/332"
1008 }
1009
1010 @TechReport{silverman-2000:cost-based-security-analysis,
1011 author = "Robert Silverman",
1012 title = "A Cost-Based Security Analysis of Symmetric and Asymmetric
1013 Key Lengths",
1014 institution = "RSA Laboratories",
1015 year = 2000,
1016 number = 13,
1017 month = "April",
1018 url = "http://www.rsa.com/rsalabs/node.asp?id=2088"
1019 }
1020
1021 @Misc{stinson-wu-2006:two-flow-zero-knowledge,
1022 author = "D.R. Stinson and J. Wu",
1023 title = "An Efficient and Secure Two-flow Zero-Knowledge
1024 Identification Protocol",
1025 howpublished = "Cryptology ePrint Archive, Report 2006/337",
1026 year = 2006,
1027 url = "http://eprint.iacr.org/2006/337"
1028 }
1029
1030 @Misc{unicode-2007:standard,
1031 author = "Unicode Consortium",
1032 title = "The {Unicode} {Standard} 5.0",
1033 year = 2007,
1034 url = "http://www.unicode.org/versions/Unicode5.0.0/"
1035 }
1036
1037 @InProceedings{wagner-goldberg:unix-passwd-hashing,
1038 author = "David Wagner and Ian Goldberg",
1039 title = "Proofs of Security for the {Unix} Password Hashing
1040 Algorithm",
1041 pages = "560--572",
1042 crossref = "Okamoto:2000:ACA",
1043 url = "http://www.cs.berkeley.edu/~daw/papers/"
1044 }
1045
1046 @Book{washington-2003:elliptic-curves,
1047 author = "Lawrence C. Washington",
1048 title = "Elliptic Curves: Number Theory and Cryptography",
1049 publisher = "CRC Press",
1050 year = 2003,
1051 isbn = "1-584-88365-0",
1052 pages = 428
1053 }
1054
1055 @TechReport{wooding-2000:storin,
1056 author = "Mark Wooding",
1057 title = "{Storin}: A block cipher for digitial signal processors",
1058 institution = "Straylight/Edgeware",
1059 year = 2000,
1060 url = "http://www.excessus.demon.co.uk/crypto/storin.ps.gz",
1061 abstract = "We present Storin: a new 96-bit block cipher designed to
1062 play to the strengths of current digital signal processors
1063 (DSPs). In particular, DSPs tend to provide single-cycle
1064 multiply-and-accumulate operations, making matrix
1065 multiplications very cheap. Working in an environment
1066 where multiplication is as fast as exclusive-or changes
1067 the usual perceptions about which operations provide good
1068 cryptographic strength cheaply. The scarcity of available
1069 memory, for code and for tables, and a penalty for
1070 nonsequential access to data also make traditional block
1071 ciphers based around substitution tables unsuitable."
1072 }
1073
1074 @Misc{wooding-2000:storin-usenet,
1075 author = "Mark Wooding",
1076 title = "Re: Yet another block cipher: {Storin}",
1077 howpublished = "Usenet article in \texttt{sci.crypt}",
1078 year = 2000,
1079 note = "Message-id {\msgid{<slrn8iqhaq.872.mdw@mull.ncipher.com>}}"
1080 }
1081
1082 @Misc{wooding-2003:new-proofs-old-modes,
1083 author = "Mark Wooding",
1084 title = "New proofs for old modes",
1085 howpublished = "Unpublished work in progress",
1086 year = 2003
1087 }
1088
1089 @Misc{wooding-2006:wrestlers,
1090 author = "Mark Wooding",
1091 title = "The Wrestlers Protocol: A simple, practical, secure,
1092 deniable protocol for key-exchange",
1093 howpublished = "Cryptology ePrint Archive, Report 2006/386",
1094 year = 2006,
1095 url = "http://eprint.iacr.org/2006/386"
1096 }
1097
1098 @Misc{wooding-2010:tripe,
1099 author = "Mark Wooding",
1100 title = "Trivial IP Encryption (TrIPE): A simple {VPN}",
1101 year = "2001--2010",
1102 url = "http://git.distorted.org.uk/~mdw/tripe/"
1103 }
1104
1105 @Misc{ylonen-2001:ssh-transport-layer,
1106 author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and
1107 S. Lehtinen",
1108 title = "{SSH} Transport Layer Protocol",
1109 howpublished = "Internet Draft",
1110 month = jan,
1111 year = 2001,
1112 url = "http://www.ietf.org/internet-drafts/draft-ietf-secsh-transport-09.txt"
1113 }
1114
1115 %%%--------------------------------------------------------------------------
1116 %%% Proceedings volumes.
1117
1118 @Proceedings{ACM:1995:PTS,
1119 title = "Proceedings of the twenty-seventh annual {ACM} Symposium
1120 on Theory of Computing: Las Vegas, Nevada, May 29--June 1,
1121 1995",
1122 year = 1995,
1123 booktitle = "Proceedings of the twenty-seventh annual {ACM} Symposium
1124 on Theory of Computing: Las Vegas, Nevada, May 29--June 1,
1125 1995",
1126 editor = "{ACM}",
1127 address = "New York, NY, USA",
1128 publisher = "ACM Press",
1129 note = "ACM order no. 508950.",
1130 pages = "viii + 763",
1131 isbn = "0-89791-718-9"
1132 }
1133
1134 @Proceedings{ACM:1998:PTA,
1135 title = "Proceedings of the thirtieth annual {ACM} Symposium on
1136 Theory of Computing: Dallas, Texas, May 23--26, 1998",
1137 year = 1998,
1138 booktitle = "Proceedings of the thirtieth annual {ACM} Symposium on
1139 Theory of Computing: Dallas, Texas, May 23--26, 1998",
1140 editor = "{ACM}",
1141 address = "New York, NY, USA",
1142 publisher = "ACM Press",
1143 note = "ACM order number 508980.",
1144 pages = "x + 684",
1145 isbn = "0-89791-962-9"
1146 }
1147
1148 @Proceedings{Blakley:1985:ACP,
1149 title = "{Advances in Cryptology: Proceedings of CRYPTO 84}",
1150 year = 1985,
1151 booktitle = "{Advances in Cryptology: Proceedings of CRYPTO 84}",
1152 editor = "George Robert Blakley and David Chaum",
1153 volume = 196,
1154 series = "Lecture Notes in Computer Science",
1155 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
1156 publisher = "Spring{\-}er-Ver{\-}lag",
1157 note = "CRYPTO 84: a Workshop on the Theory and Application of
1158 Cryptographic Techniques, held at the University of
1159 California, Santa Barbara, August 19--22, 1984, sponsored
1160 by the International Association for Cryptologic
1161 Research.",
1162 pages = "ix + 491",
1163 doi = "https://doi.org/10.1007/3-540-39568-7",
1164 isbn = "0-387-15658-5; 3-540-39568-7",
1165 issn = "0302-9743 (print), 1611-3349 (electronic)",
1166 url = "http://link.springer-ny.com/link/service/series/0558/tocs/t0196.htm"
1167 }
1168
1169 @Proceedings{Coppersmith:1995:ACC,
1170 title = "{Advances in cryptology, {CRYPTO '95}: 15th Annual
1171 International Cryptology Conference, Santa Barbara,
1172 California, {USA}, August 27--31, 1995: proceedings}",
1173 year = 1995,
1174 booktitle = "{Advances in cryptology, {CRYPTO '95}: 15th Annual
1175 International Cryptology Conference, Santa Barbara,
1176 California, {USA}, August 27--31, 1995: proceedings}",
1177 editor = "Don Coppersmith",
1178 volume = 963,
1179 series = "Lecture Notes in Computer Science",
1180 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
1181 publisher = "Spring{\-}er-Ver{\-}lag",
1182 note = "Sponsored by the International Association for Cryptologic
1183 Research (IACR), in cooperation with the IEEE Computer
1184 Society Technical Committee on Security and Privacy.",
1185 pages = "xii + 465",
1186 doi = "????",
1187 isbn = "3-540-60221-6 (Berlin)",
1188 issn = "0302-9743 (print), 1611-3349 (electronic)",
1189 url = "http://link.springer-ny.com/link/service/series/0558/tocs/t0963.htm"
1190 }
1191
1192 @Proceedings{DBLP:conf/africacrypt/2009,
1193 title = "Progress in Cryptology - AFRICACRYPT 2009, Second
1194 International Conference on Cryptology in Africa,
1195 Gammarth, Tunisia, June 21-25, 2009. Proceedings",
1196 year = 2009,
1197 booktitle = "AFRICACRYPT",
1198 editor = "Bart Preneel",
1199 volume = 5580,
1200 series = "Lecture Notes in Computer Science",
1201 publisher = "Springer",
1202 isbn = "978-3-642-02383-5",
1203 ee = "http://dx.doi.org/10.1007/978-3-642-02384-2",
1204 bibsource = "DBLP, http://dblp.uni-trier.de"
1205 }
1206
1207 @Proceedings{DBLP:conf/eurocrypt/2008,
1208 title = "Advances in Cryptology - EUROCRYPT 2008, 27th Annual
1209 International Conference on the Theory and Applications of
1210 Cryptographic Techniques, Istanbul, Turkey, April 13-17,
1211 2008. Proceedings",
1212 year = 2008,
1213 booktitle = "EUROCRYPT",
1214 editor = "Nigel P. Smart",
1215 volume = 4965,
1216 series = "Lecture Notes in Computer Science",
1217 publisher = "Springer",
1218 isbn = "978-3-540-78966-6",
1219 bibsource = "DBLP, http://dblp.uni-trier.de"
1220 }
1221
1222 @Proceedings{DBLP:conf/fse/2001,
1223 title = "Fast Software Encryption, 8th International Workshop, FSE
1224 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers",
1225 year = 2002,
1226 booktitle = "FSE",
1227 editor = "Mitsuru Matsui",
1228 volume = 2355,
1229 series = "Lecture Notes in Computer Science",
1230 publisher = "Springer",
1231 isbn = "3-540-43869-6",
1232 bibsource = "DBLP, http://dblp.uni-trier.de"
1233 }
1234
1235 @Proceedings{DBLP:conf/fse/2005,
1236 title = "Fast Software Encryption: 12th International Workshop,
1237 {FSE} 2005, Paris, France, February 21-23, 2005, Revised
1238 Selected Papers",
1239 year = 2005,
1240 editor = "Henri Gilbert and Helena Handschuh",
1241 volume = 3557,
1242 series = "Lecture Notes in Computer Science",
1243 publisher = "Springer",
1244 url = "https://doi.org/10.1007/b137506",
1245 doi = "10.1007/b137506",
1246 isbn = "3-540-26541-4",
1247 timestamp = "Tue, 30 May 2017 16:36:53 +0200",
1248 biburl = "http://dblp.uni-trier.de/rec/bib/conf/fse/2005",
1249 bibsource = "dblp computer science bibliography, http://dblp.org"
1250 }
1251
1252 @Proceedings{DBLP:conf/indocrypt/2004,
1253 title = "Progress in Cryptology - INDOCRYPT 2004, 5th International
1254 Conference on Cryptology in India, Chennai, India,
1255 December 20-22, 2004, Proceedings",
1256 year = 2004,
1257 booktitle = "INDOCRYPT",
1258 editor = "Anne Canteaut and Kapalee Viswanathan",
1259 volume = 3348,
1260 series = "Lecture Notes in Computer Science",
1261 publisher = "Springer",
1262 isbn = "3-540-24130-2",
1263 bibsource = "DBLP, http://dblp.uni-trier.de"
1264 }
1265
1266 @Proceedings{DBLP:conf/pkc/2006,
1267 title = "Public Key Cryptography - {PKC} 2006, 9th International
1268 Conference on Theory and Practice of Public-Key
1269 Cryptography, New York, NY, USA, April 24-26, 2006,
1270 Proceedings",
1271 year = 2006,
1272 editor = "Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal
1273 Malkin",
1274 volume = 3958,
1275 series = "Lecture Notes in Computer Science",
1276 publisher = "Springer",
1277 url = "https://doi.org/10.1007/11745853",
1278 doi = "10.1007/11745853",
1279 isbn = "3-540-33851-9",
1280 timestamp = "Tue, 30 May 2017 16:36:52 +0200",
1281 biburl = "http://dblp.uni-trier.de/rec/bib/conf/pkc/2006",
1282 bibsource = "dblp computer science bibliography, http://dblp.org"
1283 }
1284
1285 @Proceedings{DBLP:conf/wpes/2004,
1286 title = "Proceedings of the 2004 ACM Workshop on Privacy in the
1287 Electronic Society, WPES 2004, Washington, DC, USA,
1288 October 28, 2004",
1289 year = 2004,
1290 booktitle = "WPES",
1291 editor = "Vijay Atluri and Paul F. Syverson and Sabrina De Capitani
1292 di Vimercati",
1293 publisher = "ACM",
1294 isbn = "1-58113-968-3",
1295 bibsource = "DBLP, http://dblp.uni-trier.de"
1296 }
1297
1298 @Proceedings{DBLP:conf/wpes/2007,
1299 title = "Proceedings of the 2007 ACM Workshop on Privacy in the
1300 Electronic Society, WPES 2007, Alexandria, VA, USA,
1301 October 29, 2007",
1302 year = 2007,
1303 booktitle = "WPES",
1304 editor = "Peng Ning and Ting Yu",
1305 publisher = "ACM",
1306 isbn = "978-1-59593-883-1",
1307 bibsource = "DBLP, http://dblp.uni-trier.de"
1308 }
1309
1310 @Proceedings{DeSantis:1995:ACE,
1311 title = "Advances in cryptology --- {EUROCRYPT} '94: Workshop on
1312 the Theory and Application of Cryptographic Techniques,
1313 Perugia, Italy, May 9--12, 1994: proceedings",
1314 year = 1995,
1315 booktitle = "Advances in cryptology --- {EUROCRYPT} '94: Workshop on
1316 the Theory and Application of Cryptographic Techniques,
1317 Perugia, Italy, May 9--12, 1994: proceedings",
1318 editor = "Alfredo {De Santis}",
1319 volume = 950,
1320 series = "Lecture Notes in Computer Science",
1321 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
1322 publisher = "Spring{\-}er-Ver{\-}lag",
1323 pages = "xiii + 472",
1324 isbn = "3-540-60176-7",
1325 issn = "0302-9743 (print), 1611-3349 (electronic)"
1326 }
1327
1328 @Proceedings{Desmedt:1994:ACC,
1329 title = "{Advances in cryptology, {CRYPTO '94}: 14th annual
1330 international cryptology conference, Santa Barbara,
1331 California, {USA}, August 21--25, 1994: proceedings}",
1332 year = 1994,
1333 booktitle = "{Advances in cryptology, {CRYPTO '94}: 14th annual
1334 international cryptology conference, Santa Barbara,
1335 California, {USA}, August 21--25, 1994: proceedings}",
1336 editor = "Yvo G. Desmedt",
1337 volume = 839,
1338 series = "Lecture Notes in Computer Science",
1339 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
1340 publisher = "Spring{\-}er-Ver{\-}lag",
1341 pages = "xii + 438",
1342 doi = "????",
1343 isbn = "3-540-58333-5 (Berlin), 0-387-58333-5 (New York)",
1344 issn = "0302-9743 (print), 1611-3349 (electronic)",
1345 url = "http://link.springer-ny.com/link/service/series/0558/tocs/t0839.htm"
1346 }
1347
1348 @Proceedings{IEEE:1997:ASF,
1349 title = "38th Annual Symposium on Foundations of Computer Science:
1350 October 20--22, 1997, Miami Beach, Florida",
1351 year = 1997,
1352 booktitle = "38th Annual Symposium on Foundations of Computer Science:
1353 October 20--22, 1997, Miami Beach, Florida",
1354 editor = "{IEEE}",
1355 address = "1109 Spring Street, Suite 300, Silver Spring, MD 20910,
1356 USA",
1357 publisher = "IEEE Computer Society Press",
1358 note = "IEEE catalog number 97CB36150. IEEE Computer Society Press
1359 order number PR08197.",
1360 key = "IEEE-FOCS'97",
1361 pages = "xiii + 606",
1362 isbn = "0-8186-8197-7 (paperback), 0-8186-8198-5 (casebound),
1363 0-8186-8199-3 (microfiche)",
1364 issn = "0272-5428"
1365 }
1366
1367 @Proceedings{IEEE:2001:ISF,
1368 title = "{42nd IEEE Symposium on Foundations of Computer Science:
1369 proceedings: October 14--17, 2001, Las Vegas, Nevada,
1370 USA}",
1371 year = 2001,
1372 booktitle = "{42nd IEEE Symposium on Foundations of Computer Science:
1373 proceedings: October 14--17, 2001, Las Vegas, Nevada,
1374 USA}",
1375 editor = "{IEEE}",
1376 address = "1109 Spring Street, Suite 300, Silver Spring, MD 20910,
1377 USA",
1378 publisher = "IEEE Computer Society Press",
1379 pages = "xiii + 670",
1380 isbn = "0-7695-1390-5, 0-7695-1391-3 (case), 0-7695-1392-1
1381 (microfiche)",
1382 issn = "0272-5428"
1383 }
1384
1385 @Proceedings{Kilian:2001:ACC,
1386 title = "Advances in cryptology --- {CRYPTO} 2001: 21st Annual
1387 International Cryptology Conference, Santa Barbara,
1388 California, {USA}, August 19--23, 2001: proceedings",
1389 year = 2001,
1390 booktitle = "Advances in cryptology --- {CRYPTO} 2001: 21st Annual
1391 International Cryptology Conference, Santa Barbara,
1392 California, {USA}, August 19--23, 2001: proceedings",
1393 editor = "Joe Kilian",
1394 volume = 2139,
1395 series = "Lecture Notes in Computer Science",
1396 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
1397 publisher = "Spring{\-}er-Ver{\-}lag",
1398 pages = "xi + 598",
1399 isbn = "3-540-42456-3 (paperback)",
1400 url = "http://link.springer-ny.com/link/service/series/0558/tocs/t2139.htm"
1401 }
1402
1403 @Proceedings{Koblitz:1996:ACC,
1404 title = "{Advances in cryptology, {CRYPTO '96}: 16th annual
1405 international cryptology conference, Santa Barbara,
1406 California, {USA}, August 18--22, 1996: proceedings}",
1407 year = 1996,
1408 booktitle = "{Advances in cryptology, {CRYPTO '96}: 16th annual
1409 international cryptology conference, Santa Barbara,
1410 California, {USA}, August 18--22, 1996: proceedings}",
1411 editor = "Neal Koblitz",
1412 volume = 1109,
1413 series = "Lecture Notes in Computer Science",
1414 address = "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc.",
1415 publisher = "Spring{\-}er-Ver{\-}lag",
1416 note = "Sponsored by the International Association for Cryptologic
1417 Research (IACR), in cooperation with the IEEE Computer
1418 Society Technical Committee on Security and Privacy and
1419 the Computer Science Department of the University of
1420 California at Santa Barbara (UCSB).",
1421 annote = "``Sponsored by the International Association for
1422 Cryptologic Research (IACR), in cooperation with the IEEE
1423 Computer Society Technical Committee on Security and
1424 Privacy and the Computer Science Department of the
1425 University of California at Santa Barbara (UCSB)''",
1426 pages = "xii + 415",
1427 doi = "????",
1428 isbn = "3-540-61512-1",
1429 issn = "0302-9743 (print), 1611-3349 (electronic)",
1430 url = "http://link.springer-ny.com/link/service/series/0558/tocs/t1109.htm"
1431 }
1432
1433 %%%--------------------------------------------------------------------------
1434 \f
1435 %%% Local variables:
1436 %%% mode: bibtex
1437 %%% bibtex-maintain-sorted-entries: entry-class
1438 %%% bibtex-sort-entry-class: (("String") (catch-all) ("Proceedings"))
1439 %%% End: