mdw-crypto.bib: Turn upside-down with Emacs BibTeX mode.
authorMark Wooding <mdw@distorted.org.uk>
Sun, 25 Aug 2019 13:35:34 +0000 (14:35 +0100)
committerMark Wooding <mdw@distorted.org.uk>
Sun, 25 Aug 2019 13:35:34 +0000 (14:35 +0100)
mdw-crypto.bib

index 928f7bd..a428ae3 100644 (file)
@@ -3,7 +3,7 @@
 %%%--------------------------------------------------------------------------
 %%% Initial hacking.
 
-@preamble {
+@Preamble {
 "
 \ifx\url\undefined\let\url\texttt\fi
 \ifx\msgid\undefined\let\msgid\texttt\fi
 %%%--------------------------------------------------------------------------
 %%% The main bibliography.
 
-@InProceedings{Abdalla:2001:DHIES,
-  author =      "Michel Abdalla and Mihir Bellare and Phillip Rogaway",
-  title =       "{DHIES}: An Encryption Scheme Based on the
+@InProceedings{abdalla-2001:dhies,
+  author       = "Michel Abdalla and Mihir Bellare and Phillip Rogaway",
+  title               = "{DHIES}: An Encryption Scheme Based on the
                   {Diffie--Hellman} Problem",
-  crossref =    "Naccache:2001:TCC",
-  year =        2001,
-  url =                 "http://www-cse.ucsd.edu/users/mihir/papers/dhies.html"
-}
-
-@InProceedings{Alexander:2007:IUA,
-  author =      "Chris Alexander and Ian Goldberg",
-  title =       "Improved user authentication in off-the-record messaging",
-  booktitle =   "WPES",
-  year =        2007,
-  pages =       "41--47",
-  ee =          "http://doi.acm.org/10.1145/1314333.1314340",
-  url =                 "http://www.cypherpunks.ca/~iang/pubs/impauth.pdf",
-  crossref =    "DBLP:conf/wpes/2007",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
-}
-
-@InProceedings{Bellare:1993:ROP,
-  author =      "Mihir Bellare and Phillip Rogaway",
-  title =       "Random oracles are practical",
-  booktitle =   "Proceedings of the First Annual Conference on Computer and
+  year        = 2001,
+  crossref     = "Naccache:2001:TCC",
+  url         = "http://www-cse.ucsd.edu/users/mihir/papers/dhies.html"
+}
+
+@InProceedings{alexander-goldberg-2007:improved-user-authn-otr,
+  author       = "Chris Alexander and Ian Goldberg",
+  title               = "Improved user authentication in off-the-record messaging",
+  booktitle    = "WPES",
+  year        = 2007,
+  pages               = "41--47",
+  ee          = "http://doi.acm.org/10.1145/1314333.1314340",
+  url         = "http://www.cypherpunks.ca/~iang/pubs/impauth.pdf",
+  crossref     = "DBLP:conf/wpes/2007",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
+}
+
+@InProceedings{bellare-2004:eax,
+  author       = "Mihir Bellare and Phillip Rogaway and David Wagner",
+  title               = "The {EAX} Mode of Operation",
+  booktitle    = "FSE",
+  year        = 2004,
+  editor       = "Bimal K. Roy and Willi Meier",
+  volume       = 3017,
+  series       = "Lecture Notes in Computer Science",
+  pages               = "389--407",
+  publisher    = "Springer",
+  bibdate      = "2004-07-29",
+  bibsource    = "DBLP,
+                  http://dblp.uni-trier.de/db/conf/fse/fse2004.html#BellareRW04",
+  booktitle    = "Fast Software Encryption, 11th International Workshop,
+                  {FSE} 2004, Delhi, India, February 5-7, 2004, Revised
+                  Papers",
+  isbn        = "3-540-22171-9",
+  url         = "http://www.cs.berkeley.edu/~daw/papers/eax-fse04.ps"
+}
+
+@InProceedings{bellare-rogaway-1993:random-oracles,
+  author       = "Mihir Bellare and Phillip Rogaway",
+  title               = "Random oracles are practical",
+  booktitle    = "Proceedings of the First Annual Conference on Computer and
                   Communications Security",
+  year        = 1993,
+  pages               = "62--73",
   organization = "{ACM}",
-  year =        1993,
-  url =                 "http://www-cse.ucsd.edu/users/mihir/papers/ro.html",
-  pages =       "62--73"
+  url         = "http://www-cse.ucsd.edu/users/mihir/papers/ro.html"
 }
 
-@InProceedings{Bellare:2004:EAX,
-  title =       "The {EAX} Mode of Operation",
-  author =      "Mihir Bellare and Phillip Rogaway and David Wagner",
-  bibdate =     "2004-07-29",
-  bibsource =   "DBLP,
-                  http://dblp.uni-trier.de/db/conf/fse/fse2004.html#BellareRW04",
-  booktitle =   "FSE",
-  booktitle =   "Fast Software Encryption, 11th International Workshop,
-                  {FSE} 2004, Delhi, India, February 5-7, 2004, Revised
-                  Papers",
-  publisher =   "Springer",
-  year =        2004,
-  volume =      3017,
-  editor =      "Bimal K. Roy and Willi Meier",
-  isbn =        "3-540-22171-9",
-  pages =       "389--407",
-  series =      "Lecture Notes in Computer Science",
-  url =                 "http://www.cs.berkeley.edu/~daw/papers/eax-fse04.ps"
-}
-
-@InProceedings{Bellare:2006:STE,
-  title =       "The Security of Triple Encryption and a Framework for
+@InProceedings{bellare-rogaway-2006:security-triple-encryption,
+  author       = "Mihir Bellare and Phillip Rogaway",
+  title               = "The Security of Triple Encryption and a Framework for
                   Code-Based Game-Playing Proofs",
-  author =      "Mihir Bellare and Phillip Rogaway",
-  bibdate =     "2006-07-05",
-  bibsource =   "DBLP,
-                  http://dblp.uni-trier.de/db/conf/eurocrypt/eurocrypt2006.html#BellareR06",
-  booktitle =   "Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual
+  booktitle    = "Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual
                   International Conference on the Theory and Applications of
                   Cryptographic Techniques, St. Petersburg, Russia, May 28 -
                   June 1, 2006, Proceedings",
-  publisher =   "Springer",
-  year =        2006,
-  volume =      4004,
-  editor =      "Serge Vaudenay",
-  isbn =        "3-540-34546-9",
-  pages =       "409--426",
-  series =      "Lecture Notes in Computer Science",
-  note =        "Proceedings version of \cite{cryptoeprint:2004:331}"
-}
-
-@InProceedings{Bernstein:2006:CDH,
-  author =      "Daniel J. Bernstein",
-  title =       "Curve25519: New Diffie-Hellman Speed Records",
-  booktitle =   "Public Key Cryptography - {PKC} 2006, 9th International
+  year        = 2006,
+  editor       = "Serge Vaudenay",
+  volume       = 4004,
+  series       = "Lecture Notes in Computer Science",
+  pages               = "409--426",
+  publisher    = "Springer",
+  note        = "Proceedings version of \cite{cryptoeprint:2004:331}",
+  bibdate      = "2006-07-05",
+  bibsource    = "DBLP,
+                  http://dblp.uni-trier.de/db/conf/eurocrypt/eurocrypt2006.html#BellareR06",
+  isbn        = "3-540-34546-9"
+}
+
+@InProceedings{bernstein-2005:poly1305,
+  author       = "Daniel J. Bernstein",
+  title               = "The Poly1305-AES Message-Authentication Code",
+  booktitle    = "Fast Software Encryption: 12th International Workshop,
+                  {FSE} 2005, Paris, France, February 21-23, 2005, Revised
+                  Selected Papers",
+  year        = 2005,
+  pages               = "32--49",
+  crossref     = "DBLP:conf/fse/2005",
+  url         = "https://doi.org/10.1007/11502760_3",
+  doi         = "10.1007/11502760_3",
+  timestamp    = "Tue, 30 May 2017 16:36:53 +0200",
+  biburl       = "http://dblp.uni-trier.de/rec/bib/conf/fse/Bernstein05",
+  bibsource    = "dblp computer science bibliography, http://dblp.org"
+}
+
+@Misc{bernstein-2005:salsa20,
+  author       = "Daniel J. Bernstein",
+  title               = "{Salsa20} Specification",
+  howpublished = "Submission to the ECRYPT Stream Cipher project (eSTREAM)",
+  month               = apr,
+  year        = 2005,
+  url         = "https://cr.yp.to/snuffle/spec.pdf"
+}
+
+@InProceedings{bernstein-2006:curve25519,
+  author       = "Daniel J. Bernstein",
+  title               = "Curve25519: New Diffie-Hellman Speed Records",
+  booktitle    = "Public Key Cryptography - {PKC} 2006, 9th International
                   Conference on Theory and Practice of Public-Key
                   Cryptography, New York, NY, USA, April 24-26, 2006,
                   Proceedings",
-  pages =       "207--228",
-  year =        2006,
-  crossref =    "DBLP:conf/pkc/2006",
-  url =                 "https://cr.yp.to/papers.html#curve25519",
-  doi =                 "10.1007/11745853_14",
-  timestamp =   "Tue, 30 May 2017 16:36:52 +0200",
-  biburl =      "http://dblp.uni-trier.de/rec/bib/conf/pkc/Bernstein06",
-  bibsource =   "dblp computer science bibliography, http://dblp.org"
-}
-
-@InProceedings{Borisov:2004:OTR,
-  author =      "Nikita Borisov and Ian Goldberg and Eric A. Brewer",
-  title =       "Off-the-record communication, or, why not to use PGP",
-  booktitle =   "WPES",
-  year =        2004,
-  pages =       "77--84",
-  ee =          "http://doi.acm.org/10.1145/1029179.1029200",
-  url =                 "http://www.cypherpunks.ca/otr/otr-wpes.pdf",
-  crossref =    "DBLP:conf/wpes/2004",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
-}
-
-@InProceedings{Brassard:1989:SZK,
-  author =      "Gilles Brassard and Claude Crepeau",
-  title =       "Sorting out Zero-Knowledge",
-  booktitle =   "Theory and Application of Cryptographic Techniques",
-  pages =       "181--191",
-  year =        1989,
-  url =                 "http://citeseer.nj.nec.com/brassard90sorting.html"
-}
-
-@TechReport{Canetti:2001:UCS,
-  author =      "Ran Canetti",
-  title =       "Universally Composable Security: {A} New Paradigm for
+  year        = 2006,
+  pages               = "207--228",
+  crossref     = "DBLP:conf/pkc/2006",
+  url         = "https://cr.yp.to/papers.html#curve25519",
+  doi         = "10.1007/11745853_14",
+  timestamp    = "Tue, 30 May 2017 16:36:52 +0200",
+  biburl       = "http://dblp.uni-trier.de/rec/bib/conf/pkc/Bernstein06",
+  bibsource    = "dblp computer science bibliography, http://dblp.org"
+}
+
+@InProceedings{borisov-2004:off-the-record,
+  author       = "Nikita Borisov and Ian Goldberg and Eric A. Brewer",
+  title               = "Off-the-record communication, or, why not to use PGP",
+  booktitle    = "WPES",
+  year        = 2004,
+  pages               = "77--84",
+  ee          = "http://doi.acm.org/10.1145/1029179.1029200",
+  url         = "http://www.cypherpunks.ca/otr/otr-wpes.pdf",
+  crossref     = "DBLP:conf/wpes/2004",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
+}
+
+@InProceedings{brassard-crepeau-1989:sorting-zero-knowledge,
+  author       = "Gilles Brassard and Claude Crepeau",
+  title               = "Sorting out Zero-Knowledge",
+  booktitle    = "Theory and Application of Cryptographic Techniques",
+  year        = 1989,
+  pages               = "181--191",
+  url         = "http://citeseer.nj.nec.com/brassard90sorting.html"
+}
+
+@TechReport{canetti-2001:universally-composable-security,
+  author       = "Ran Canetti",
+  title               = "Universally Composable Security: {A} New Paradigm for
                   Cryptographic Protocols",
-  added-by =    "sti",
-  url =                 "http://eprint.iacr.org/2000/067",
-  number =      "2000/067",
-  month =       oct,
-  abstract =    "We propose a new paradigm for defining security of
-                  cryptographic protocols, called {\sf universally composable
-                  security.} The salient property of universally composable
-                  definitions of security is that they guarantee security
-                  even when a secure protocol is composed with an arbitrary
-                  set of protocols, or more generally when the protocol is
-                  used as a component of an arbitrary system. This is an
-                  essential property for maintaining security of
-                  cryptographic protocols in complex and unpredictable
-                  environments such as the Internet. In particular,
-                  universally composable definitions guarantee security even
-                  when an unbounded number of protocol instances are executed
-                  concurrently in an adversarially controlled manner, they
-                  guarantee non-malleability with respect to arbitrary
-                  protocols, and more. We show how to formulate universally
-                  composable definitions of security for practically any
-                  cryptographic task. Furthermore, we demonstrate that
-                  practically any such definition can be realized using known
-                  general techniques, as long as only a minority of the
-                  participants are corrupted. We then proceed to formulate
-                  universally composable definitions of a wide array of
-                  cryptographic tasks, including authenticated and secure
-                  communication, key-exchange, public-key encryption,
-                  signature, commitment, oblivious transfer, zero-knowledge,
-                  and more. We also make initial steps towards studying the
-                  realizability of the proposed definitions in other natural
-                  settings.",
-  keywords =    "foundations / cryptographic protocols, security analysis of
-                  protocols, concurrent composition",
-  type =        "Report",
-  annote =      "Revised version of \cite{Canetti:2000:SCM}.",
-  year =        2001,
-  institution =         "Cryptology {ePrint} Archive",
-  added-at =    "Wed Oct 17 16:02:37 2001",
-  note =        "Extended Abstract appeared in proceedings of the 42nd
-                  Symposium on Foundations of Computer Science (FOCS), 2001"
-}
-
-@PhdThesis{Daemen:1995:CHF,
-  author =      "Joan Daemen",
-  title =       "Cipher and hash function design strategies based on linear
+  institution  = "Cryptology {ePrint} Archive",
+  year        = 2001,
+  type        = "Report",
+  number       = "2000/067",
+  month               = oct,
+  note        = "Extended Abstract appeared in proceedings of the 42nd
+                  Symposium on Foundations of Computer Science (FOCS), 2001",
+  annote       = "Revised version of \cite{Canetti:2000:SCM}.",
+  added-by     = "sti",
+  url         = "http://eprint.iacr.org/2000/067",
+  abstract     = "We propose a new paradigm for defining security of
+                  cryptographic protocols, called {\sf universally
+                  composable security.} The salient property of universally
+                  composable definitions of security is that they guarantee
+                  security even when a secure protocol is composed with an
+                  arbitrary set of protocols, or more generally when the
+                  protocol is used as a component of an arbitrary
+                  system. This is an essential property for maintaining
+                  security of cryptographic protocols in complex and
+                  unpredictable environments such as the Internet. In
+                  particular, universally composable definitions guarantee
+                  security even when an unbounded number of protocol
+                  instances are executed concurrently in an adversarially
+                  controlled manner, they guarantee non-malleability with
+                  respect to arbitrary protocols, and more. We show how to
+                  formulate universally composable definitions of security
+                  for practically any cryptographic task. Furthermore, we
+                  demonstrate that practically any such definition can be
+                  realized using known general techniques, as long as only a
+                  minority of the participants are corrupted. We then
+                  proceed to formulate universally composable definitions of
+                  a wide array of cryptographic tasks, including
+                  authenticated and secure communication, key-exchange,
+                  public-key encryption, signature, commitment, oblivious
+                  transfer, zero-knowledge, and more. We also make initial
+                  steps towards studying the realizability of the proposed
+                  definitions in other natural settings.",
+  keywords     = "foundations / cryptographic protocols, security analysis
+                  of protocols, concurrent composition",
+  added-at     = "Wed Oct 17 16:02:37 2001"
+}
+
+@Misc{certicom-2000:sec1,
+  author       = "{Certicom Research}",
+  title               = "Standards for Efficient Cryptography, {SEC} 1: {E}lliptic
+                  curve cryptography, Version 1.0",
+  year        = 2000,
+  url         = "http://www.secg.org/download/aid-385/sec1_final.pdf"
+}
+
+@PhdThesis{daemen-1995:cipher-hash-design,
+  author       = "Joan Daemen",
+  title               = "Cipher and hash function design strategies based on linear
                   and differential cryptanalysis",
-  year =        1995,
-  school =      "K. U. Leuven"
+  school       = "K. U. Leuven",
+  year        = 1995
 }
 
-@Misc{Ellis:1997:SNS,
-  author =      "James Ellis",
-  title =       "The Story of Non-Secret Encryption",
-  howpublished = "CESG internal document",
-  month =       dec,
-  year =        1997,
-  note =        "Released internally in 1987.",
-  url =                 "http://www.jya.com/ellisdoc.htm"
+@Manual{dworkin-2010:cbc-ciphertext-stealing,
+  title               = "Recommendation for Block Cipher Modes of Operation: Three
+                  Variants of Ciphertext Stealing for CBC Mode",
+  author       = "Morris Dworkin",
+  organization = pub-NIST,
+  address      = pub-NIST:adr,
+  month               = oct,
+  year        = 2010,
+  note        = "Addendum to NIST Special Publication 800-38A",
+  pages               = "iv + 7",
+  url         = "http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a-add.pdf"
 }
 
-@Misc{Ferguson:2005:AWG,
-  author =      "Niels Ferguson",
-  title =       "Authentication Weaknesses in {GCM}",
-  year =        2005,
-  month =       "May",
-  url =          "http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/CWC-GCM/Ferguson2.pdf",
-  note =        "Public comment to NIST"
+@Misc{ellis-1997:non-secret-encryption,
+  author       = "James Ellis",
+  title               = "The Story of Non-Secret Encryption",
+  howpublished = "CESG internal document",
+  month               = dec,
+  year        = 1997,
+  note        = "Released internally in 1987.",
+  url         = "http://www.jya.com/ellisdoc.htm"
 }
 
-@Misc{Fisher:2000:Storin-collide,
-  author =      "Matthew Fisher",
-  title =       "Re: Yet another block cipher: {Storin}",
-  howpublished = "Usenet article in {\texttt{sci.crypt}}",
-  year =        2000,
-  note =        "Message-id {\msgid{<8gjctn\$9ct\$1@nnrp1.deja.com>}}"
+@Misc{ferguson-2005:gcm-authn-weakness,
+  author       = "Niels Ferguson",
+  title               = "Authentication Weaknesses in {GCM}",
+  month               = "May",
+  year        = 2005,
+  note        = "Public comment to NIST",
+  url         = "http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/CWC-GCM/Ferguson2.pdf"
 }
 
-@TechReport{Frier:1996:SSL,
-  author =      "A. Frier and P. Karlton and P. Kocher",
-  title =       "The {SSL 3.0} Protocol",
-  institution =         "Netscape Communications Corp.",
-  month =       nov,
-  year =        1996,
-  url =                 "http://home.netscape.com/eng/ssl3/ssl-toc.html"
+@Misc{fisher-2000:storin-usenet,
+  author       = "Matthew Fisher",
+  title               = "Re: Yet another block cipher: {Storin}",
+  howpublished = "Usenet article in {\texttt{sci.crypt}}",
+  year        = 2000,
+  note        = "Message-id {\msgid{<8gjctn\$9ct\$1@nnrp1.deja.com>}}"
 }
 
-@Misc{Goldwasser:1999:LNC,
-  author =      "Shafi Goldwasser and Mihir Bellare",
-  title =       "Lecture Notes on Cryptography",
+@Misc{goldwasser-bellare-1999:lecture-notes-crypto,
+  author       = "Shafi Goldwasser and Mihir Bellare",
+  title               = "Lecture Notes on Cryptography",
   howpublished = "Summer Course ``Cryptography and Computer Security'' at
                   MIT, 1996--1999",
-  year =        1999,
-  url =                 "http://citeseer.nj.nec.com/goldwasser96lecture.html"
+  year        = 1999,
+  url         = "http://citeseer.nj.nec.com/goldwasser96lecture.html"
 }
 
-@InProceedings{Groth:2008:ENP,
-  author =      "Jens Groth and Amit Sahai",
-  title =       "Efficient Non-interactive Proof Systems for Bilinear
+@InProceedings{groth-sahai-2008:proofs-for-bilinear-groups,
+  author       = "Jens Groth and Amit Sahai",
+  title               = "Efficient Non-interactive Proof Systems for Bilinear
                   Groups",
-  booktitle =   "EUROCRYPT",
-  year =        2008,
-  pages =       "415--432",
-  ee =          "http://dx.doi.org/10.1007/978-3-540-78967-3_24",
-  crossref =    "DBLP:conf/eurocrypt/2008",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
+  booktitle    = "EUROCRYPT",
+  year        = 2008,
+  pages               = "415--432",
+  ee          = "http://dx.doi.org/10.1007/978-3-540-78967-3_24",
+  crossref     = "DBLP:conf/eurocrypt/2008",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
 }
 
-@Manual{IEEE:2000:1363,
-  author =      "{IEEE}",
-  title =       "IEEE 1363-2000: Standard Specifications for Public Key
+@Manual{ieee-2000:1363,
+  title               = "IEEE 1363-2000: Standard Specifications for Public Key
                   Cryptography",
-  year =        2000,
-  isbn =        "0-7381-1956-3",
-  abstract =    "This standard specifies common public-key cryptographic
+  author       = "{IEEE}",
+  organization = "Microprocessor Standards Committee of the IEEE Computer
+                  Society, USA",
+  year        = 2000,
+  isbn        = "0-7381-1956-3",
+  abstract     = "This standard specifies common public-key cryptographic
                   techniques, including mathematical primitives for secret
                   value (key) derivation, public-key encryption, and digital
                   signatures, and cryptographic schemes based on those
                   parameters, public keys and private keys. The purpose of
                   this standard is to provide a reference for specifications
                   of a variety of techniques from which applications may
-                  select.",
-  organization = "Microprocessor Standards Committee of the IEEE Computer
-                  Society, USA"
+                  select."
 }
 
-@Manual{IEEE:2004:1363a,
-  title =       "{IEEE} 1363a-2004: Standard Specifications for Public Key
+@Manual{ieee-2004:1363a,
+  title               = "{IEEE} 1363a-2004: Standard Specifications for Public Key
                   Cryptography -- Amendment 1: Additional Techniques",
-  author =      "{IEEE}",
+  author       = "{IEEE}",
   organization = "Microprocessor Standards Committee of the IEEE Computer
                   Society, USA",
-  year =        2004,
-  note =        "Amendment to \cite{IEEE:2000:1363}.",
-  isbn =        "0-7381-4003-1",
-  abstract =    "Amendment to IEEE Std 1363-2000.  This standard specifies
-                  additional public-key cryptographic techniques beyond those
-                  in IEEE Std 1363-2000. It is intended to be merged with
-                  IEEE Std 1363-2000 during future revisions."
-}
-
-@PhdThesis{IWJ:1997:WGT,
-  author =      "Ian Jackson",
-  title =       "Who goes there?  Location confidentiality through
+  year        = 2004,
+  note        = "Amendment to \cite{IEEE:2000:1363}.",
+  isbn        = "0-7381-4003-1",
+  abstract     = "Amendment to IEEE Std 1363-2000.  This standard specifies
+                  additional public-key cryptographic techniques beyond
+                  those in IEEE Std 1363-2000. It is intended to be merged
+                  with IEEE Std 1363-2000 during future revisions."
+}
+
+@PhdThesis{jackson-1997:who-goes-there,
+  author       = "Ian Jackson",
+  title               = "Who goes there?  Location confidentiality through
                   anonymity",
-  year =        1997,
-  school =      "Cambridge University Computer Laboratory",
-  pages =       "vi + 97",
-  url =                 "http://www.chiark.greenend.org.uk/~ijackson/thesis/"
+  school       = "Cambridge University Computer Laboratory",
+  year        = 1997,
+  pages               = "vi + 97",
+  url         = "http://www.chiark.greenend.org.uk/~ijackson/thesis/"
 }
 
-@Misc{Kohno:2003:CWC,
-  author =      "Tadayoshi Kohno and John Viega and Doug Whiting",
-  title =       "The CWC Authenticated Encryption (Associated Data) Mode",
+@TechReport{kocher-1996:ssl3,
+  author       = "A. Frier and P. Karlton and P. Kocher",
+  title               = "The {SSL 3.0} Protocol",
+  institution  = "Netscape Communications Corp.",
+  year        = 1996,
+  month               = nov,
+  url         = "http://home.netscape.com/eng/ssl3/ssl-toc.html"
+}
+
+@Misc{kohno-2003:cwc,
+  author       = "Tadayoshi Kohno and John Viega and Doug Whiting",
+  title               = "The CWC Authenticated Encryption (Associated Data) Mode",
   howpublished = "Cryptology ePrint Archive, Report 2003/106",
-  year =        2003,
-  url =                 "http://eprint.iacr.org/2003/106"
+  year        = 2003,
+  url         = "http://eprint.iacr.org/2003/106"
 }
 
-@InProceedings{Maurer:2009:UZK,
-  author =      "Ueli M. Maurer",
-  title =       "Unifying Zero-Knowledge Proofs of Knowledge",
-  booktitle =   "AFRICACRYPT",
-  year =        2009,
-  pages =       "272-286",
-  ee =          "http://dx.doi.org/10.1007/978-3-642-02384-2_17",
-  crossref =    "DBLP:conf/africacrypt/2009",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
+@InProceedings{maurer-2009:unify-proofs-of-knowledge,
+  author       = "Ueli M. Maurer",
+  title               = "Unifying Zero-Knowledge Proofs of Knowledge",
+  booktitle    = "AFRICACRYPT",
+  year        = 2009,
+  pages               = "272-286",
+  ee          = "http://dx.doi.org/10.1007/978-3-642-02384-2_17",
+  crossref     = "DBLP:conf/africacrypt/2009",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
 }
 
-@InProceedings{McGrew:2004:SPG,
-  author =      "David A. McGrew and John Viega",
-  title =       "The Security and Performance of the Galois/Counter Mode
+@InProceedings{mcgrew-viega-2004:gcm-security-performance,
+  author       = "David A. McGrew and John Viega",
+  title               = "The Security and Performance of the Galois/Counter Mode
                   ({GCM}) of Operation",
-  bibdate =     "2004-12-13",
-  bibsource =   "DBLP,
-                  http://dblp.uni-trier.de/db/conf/indocrypt/indocrypt2004.html#McGrewV04",
-  booktitle =   "Progress in Cryptology - {INDOCRYPT} 2004, 5th
+  booktitle    = "Progress in Cryptology - {INDOCRYPT} 2004, 5th
                   International Conference on Cryptology in India, Chennai,
                   India, December 20-22, 2004, Proceedings",
-  publisher =   "Springer",
-  year =        2004,
-  volume =      3348,
-  editor =      "Anne Canteaut and Kapalee Viswanathan",
-  isbn =        "3-540-24130-2",
-  pages =       "343--355",
-  series =      "Lecture Notes in Computer Science",
-  url =                 "http://eprint.iacr.org/2004/193"
-}
-
-@Misc{Menezes:2005:IPB,
-  author =      "Alfred Menezes",
-  title =       "An Introduction to Pairing-Based Cryptography",
-  url =
-                  "http://www.cacr.math.uwaterloo.ca/~ajmeneze/publications/pairings.pdf",
-  note =        "Notes from lectures given in Santander, Spain",
-  year =        2005
-}
-
-@InProceedings{Rogaway:2001:OCB,
-  author =      "Phillip Rogaway and Mihir Bellare and John Black and Ted
+  year        = 2004,
+  editor       = "Anne Canteaut and Kapalee Viswanathan",
+  volume       = 3348,
+  series       = "Lecture Notes in Computer Science",
+  pages               = "343--355",
+  publisher    = "Springer",
+  bibdate      = "2004-12-13",
+  bibsource    = "DBLP, http://dblp.uni-trier.de/db/conf/indocrypt/indocrypt2004.html#McGrewV04",
+  isbn        = "3-540-24130-2",
+  url         = "http://eprint.iacr.org/2004/193"
+}
+
+@Misc{menezes-2005:intro-pairing-crypto,
+  author       = "Alfred Menezes",
+  title               = "An Introduction to Pairing-Based Cryptography",
+  year        = 2005,
+  note        = "Notes from lectures given in Santander, Spain",
+  url         = "http://www.cacr.math.uwaterloo.ca/~ajmeneze/publications/pairings.pdf"
+}
+
+@Manual{nist-2005:cmac,
+  title               = "Recommentation for Block Cipher Modes of Operation: The
+                  {CMAC} Mode for Authentication",
+  author       = "{NIST}",
+  organization = pub-NIST,
+  address      = pub-NIST:adr,
+  month               = may,
+  year        = 2005,
+  volume       = "SP~800-38\,B",
+  series       = "Special Publications",
+  url         = "http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf"
+}
+
+@Manual{nist-2008:triple-des,
+  title               = "Recommendation for the {Triple Data Encryption Algorithm}
+                  ({TDEA}) Block Cipher",
+  author       = "{NIST}",
+  organization = pub-NIST,
+  address      = pub-NIST:adr,
+  month               = may,
+  year        = 2008,
+  volume       = "SP~800-67",
+  pages               = "x + 30",
+  day         = 19,
+  series       = "Special Publications",
+  url         = "http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf",
+  acknowledgement= ack-nhfb
+}
+
+@InProceedings{rogaway-2001:ocb,
+  author       = "Phillip Rogaway and Mihir Bellare and John Black and Ted
                   Krovetz",
-  title =       "{OCB}: a block-cipher mode of operation for efficient
+  title               = "{OCB}: a block-cipher mode of operation for efficient
                   authenticated encryption",
-  booktitle =   "{ACM} Conference on Computer and Communications Security",
-  pages =       "196--205",
-  year =        2001,
-  url =                 "http://www.cs.ucdavis.edu/~rogaway/ocb/"
-}
-
-@InProceedings{Rogaway:2002:AEA,
-  author =      "Phillip Rogaway",
-  title =       "Authenticated-encryption with associated-data",
-  added-by =    "msteiner",
-  url =                 "http://www.cs.ucdavis.edu/~rogaway/papers/ad.html",
-  pages =       "98--107",
-  added-at =    "Sun Nov 16 12:50:24 2003",
-  abstract =    "When a message is transformed into a ciphertext in a way
+  booktitle    = "{ACM} Conference on Computer and Communications Security",
+  year        = 2001,
+  pages               = "196--205",
+  url         = "http://www.cs.ucdavis.edu/~rogaway/ocb/"
+}
+
+@InProceedings{rogaway-2002:aead,
+  author       = "Phillip Rogaway",
+  title               = "Authenticated-encryption with associated-data",
+  booktitle    = "Proceedings of the 9th {ACM} Conference on Computer and
+                  Communications Security",
+  year        = 2002,
+  editor       = "Ravi Sandhu",
+  pages               = "98--107",
+  month               = nov,
+  address      = "Washington, DC, USA",
+  publisher    = "ACM Press",
+  added-by     = "msteiner",
+  url         = "http://www.cs.ucdavis.edu/~rogaway/papers/ad.html",
+  added-at     = "Sun Nov 16 12:50:24 2003",
+  abstract     = "When a message is transformed into a ciphertext in a way
                   designed to protect both its privacy and authenticity,
                   there may be additional information, such as a packet
                   header, that travels alongside the ciphertext (at least
                   conceptually) and must get authenticated with it. We
                   formalize and investigate this authenticated-encryption
-                  with associated-data (AEAD) problem. Though the problem has
-                  long been addressed in cryptographic practice, it was never
-                  provided a definition or even a name. We do this, and go on
-                  to look at efficient solutions for AEAD, both in general
-                  and for the authenticated-encryption scheme OCB. For the
-                  general setting we study two simple ways to turn an
-                  authenticated-encryption scheme that does not support
-                  associated-data into one that does: nonce stealing and
-                  ciphertext translation. For the case of OCB we construct an
-                  AEAD-scheme by combining OCB and the pseudorandom function
-                  PMAC, using the same key for both algorithms. We prove
-                  that, despite ``interaction'' between the two schemes when
-                  using a common key, the combination is sound. We also
-                  consider achieving AEAD by the generic composition of a
-                  nonce-based, privacy-only encryption scheme and a
-                  pseudorandom function.",
-  booktitle =   "Proceedings of the 9th {ACM} Conference on Computer and
-                  Communications Security",
-  year =        2002,
-  editor =      "Ravi Sandhu",
-  month =       nov,
-  publisher =   "ACM Press",
-  address =     "Washington, DC, USA"
-}
-
-@Misc{SEC1,
-  author =      "{Certicom Research}",
-  title =       "Standards for Efficient Cryptography, {SEC} 1: {E}lliptic
-                  curve cryptography, Version 1.0",
-  year =        2000,
-  url =                 "http://www.secg.org/download/aid-385/sec1_final.pdf"
-}
-
-@Manual{SP:2005:BCM,
-  author =      "{NIST}",
-  title =       "Recommentation for Block Cipher Modes of Operation: The
-                  {CMAC} Mode for Authentication",
-  volume =      "SP~800-38\,B",
-  organization = pub-NIST,
-  address =     pub-NIST:adr,
-  month =       may,
-  year =        2005,
-  series =      "Special Publications",
-  url =          "http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf"
-}
-
-@Manual{SP:2008:TDEA,
-  author =      "{NIST}",
-  title =       "Recommendation for the {Triple Data Encryption Algorithm}
-                  ({TDEA}) Block Cipher",
-  volume =      "SP~800-67",
-  organization = pub-NIST,
-  address =     pub-NIST:adr,
-  pages =       "x + 30",
-  day =                 19,
-  month =       may,
-  year =        2008,
-  series =      "Special Publications",
-  url =          "http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf",
-  acknowledgement =ack-nhfb
-}
-
-@Unpublished{Shoup:2001:PIS,
-  author =      "Victor Shoup",
-  title =       "Proposal for an {ISO} Standard for Public Key Encryption
+                  with associated-data (AEAD) problem. Though the problem
+                  has long been addressed in cryptographic practice, it was
+                  never provided a definition or even a name. We do this,
+                  and go on to look at efficient solutions for AEAD, both in
+                  general and for the authenticated-encryption scheme
+                  OCB. For the general setting we study two simple ways to
+                  turn an authenticated-encryption scheme that does not
+                  support associated-data into one that does: nonce stealing
+                  and ciphertext translation. For the case of OCB we
+                  construct an AEAD-scheme by combining OCB and the
+                  pseudorandom function PMAC, using the same key for both
+                  algorithms. We prove that, despite ``interaction'' between
+                  the two schemes when using a common key, the combination
+                  is sound. We also consider achieving AEAD by the generic
+                  composition of a nonce-based, privacy-only encryption
+                  scheme and a pseudorandom function."
+}
+
+@Unpublished{shoup-2001:proposal-iso-public-key,
+  author       = "Victor Shoup",
+  title               = "Proposal for an {ISO} Standard for Public Key Encryption
                   (Version 2.0)",
-  year =        2001,
-  note =        "Unpublished manuscript",
-  url =                 "http://www.shoup.net/papers/"
+  note        = "Unpublished manuscript",
+  year        = 2001,
+  url         = "http://www.shoup.net/papers/"
 }
 
-@TechReport{Silverman:2000:CBA,
-  author =      "Robert Silverman",
-  title =       "A Cost-Based Security Analysis of Symmetric and Asymmetric
+@TechReport{silverman-2000:cost-based-security-analysis,
+  author       = "Robert Silverman",
+  title               = "A Cost-Based Security Analysis of Symmetric and Asymmetric
                   Key Lengths",
-  institution =         "RSA Laboratories",
-  number =      13,
-  month =       "April",
-  year =        2000,
-  url =                 "http://www.rsa.com/rsalabs/node.asp?id=2088"
+  institution  = "RSA Laboratories",
+  year        = 2000,
+  number       = 13,
+  month               = "April",
+  url         = "http://www.rsa.com/rsalabs/node.asp?id=2088"
 }
 
-@Misc{Unicode:5.0,
-  author =      "Unicode Consortium",
-  title =       "The {Unicode} {Standard} 5.0",
-  year =        2007,
-  url =                 "http://www.unicode.org/versions/Unicode5.0.0/"
+@Misc{unicode-2007:standard,
+  author       = "Unicode Consortium",
+  title               = "The {Unicode} {Standard} 5.0",
+  year        = 2007,
+  url         = "http://www.unicode.org/versions/Unicode5.0.0/"
 }
 
-@InProceedings{Wagner:2000:PSU,
-  author =      "David Wagner and Ian Goldberg",
-  title =       "Proofs of Security for the {Unix} Password Hashing
+@InProceedings{wagner-goldberg:unix-passwd-hashing,
+  author       = "David Wagner and Ian Goldberg",
+  title               = "Proofs of Security for the {Unix} Password Hashing
                   Algorithm",
-  crossref =    "Okamoto:2000:ACA",
-  pages =       "560--572",
-  url =                 "http://www.cs.berkeley.edu/~daw/papers/"
-}
-
-@Book{Washington:2003:EC,
-  author =      "Lawrence C. Washington",
-  title =       "Elliptic Curves: Number Theory and Cryptography",
-  isbn =        "1-584-88365-0",
-  publisher =   "CRC Press",
-  year =        2003,
-  pages =       428
-}
-
-@TechReport {Wooding:2000:Storin,
-  author =      "Mark Wooding",
-  title =       "{Storin}: A block cipher for digitial signal processors",
-  institution =         "Straylight/Edgeware",
-  year =        2000,
-  url =                 "http://www.excessus.demon.co.uk/crypto/storin.ps.gz",
-  abstract =    "We present Storin: a new 96-bit block cipher designed to
+  pages               = "560--572",
+  crossref     = "Okamoto:2000:ACA",
+  url         = "http://www.cs.berkeley.edu/~daw/papers/"
+}
+
+@Book{washington-2003:elliptic-curves,
+  author       = "Lawrence C. Washington",
+  title               = "Elliptic Curves: Number Theory and Cryptography",
+  publisher    = "CRC Press",
+  year        = 2003,
+  isbn        = "1-584-88365-0",
+  pages               = 428
+}
+
+@TechReport {wooding-2000:storin,
+  author       = "Mark Wooding",
+  title               = "{Storin}: A block cipher for digitial signal processors",
+  institution  = "Straylight/Edgeware",
+  year        = 2000,
+  url         = "http://www.excessus.demon.co.uk/crypto/storin.ps.gz",
+  abstract     = "We present Storin: a new 96-bit block cipher designed to
                   play to the strengths of current digital signal processors
                   (DSPs).  In particular, DSPs tend to provide single-cycle
                   multiply-and-accumulate operations, making matrix
                   multiplications very cheap.  Working in an environment
-                  where multiplication is as fast as exclusive-or changes the
-                  usual perceptions about which operations provide good
+                  where multiplication is as fast as exclusive-or changes
+                  the usual perceptions about which operations provide good
                   cryptographic strength cheaply.  The scarcity of available
                   memory, for code and for tables, and a penalty for
                   nonsequential access to data also make traditional block
                   ciphers based around substitution tables unsuitable."
 }
 
-@Misc{Wooding:2000:Storin-diff,
-  author =      "Mark Wooding",
-  title =       "Re: Yet another block cipher: {Storin}",
+@Misc{wooding-2000:storin-usenet,
+  author       = "Mark Wooding",
+  title               = "Re: Yet another block cipher: {Storin}",
   howpublished = "Usenet article in \texttt{sci.crypt}",
-  year =        2000,
-  note =        "Message-id {\msgid{<slrn8iqhaq.872.mdw@mull.ncipher.com>}}"
+  year        = 2000,
+  note        = "Message-id {\msgid{<slrn8iqhaq.872.mdw@mull.ncipher.com>}}"
 }
 
-@Misc{Wooding:2001:TrIPE,
-  author =      "Mark Wooding",
-  year =        "2001--2010",
-  url =                 "http://git.distorted.org.uk/~mdw/tripe/",
-  title =       "Trivial IP Encryption (TrIPE): A simple {VPN}"
+@Misc{wooding-2003:new-proofs-old-modes,
+  author       = "Mark Wooding",
+  title               = "New proofs for old modes",
+  howpublished = "Unpublished work in progress",
+  year        = 2003
 }
 
-@Misc{Wooding:2003:NPO,
-  author =      "Mark Wooding",
-  title =       "New proofs for old modes",
-  howpublished = "Unpublished work in progress",
-  year =        2003
+@Misc{wooding-2010:tripe,
+  author       = "Mark Wooding",
+  title               = "Trivial IP Encryption (TrIPE): A simple {VPN}",
+  year        = "2001--2010",
+  url         = "http://git.distorted.org.uk/~mdw/tripe/"
 }
 
-@Misc{Ylonen:2001:STL,
-  author =      "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and
+@Misc{ylonen-2001:ssh-transport-layer,
+  author       = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and
                   S. Lehtinen",
-  title =       "{SSH} Transport Layer Protocol",
-  month =       jan,
-  year =        2001,
+  title               = "{SSH} Transport Layer Protocol",
   howpublished = "Internet Draft",
-  url =          "http://www.ietf.org/internet-drafts/draft-ietf-secsh-transport-09.txt"
+  month               = jan,
+  year        = 2001,
+  url         = "http://www.ietf.org/internet-drafts/draft-ietf-secsh-transport-09.txt"
 }
 
 %%%--------------------------------------------------------------------------
 %%% Proceedings volumes.
 
 @Proceedings{DBLP:conf/africacrypt/2009,
-  editor =      "Bart Preneel",
-  title =       "Progress in Cryptology - AFRICACRYPT 2009, Second
-                  International Conference on Cryptology in Africa, Gammarth,
-                  Tunisia, June 21-25, 2009. Proceedings",
-  booktitle =   "AFRICACRYPT",
-  publisher =   "Springer",
-  series =      "Lecture Notes in Computer Science",
-  volume =      5580,
-  year =        2009,
-  isbn =        "978-3-642-02383-5",
-  ee =          "http://dx.doi.org/10.1007/978-3-642-02384-2",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
+  title               = "Progress in Cryptology - AFRICACRYPT 2009, Second
+                  International Conference on Cryptology in Africa,
+                  Gammarth, Tunisia, June 21-25, 2009. Proceedings",
+  year        = 2009,
+  booktitle    = "AFRICACRYPT",
+  editor       = "Bart Preneel",
+  volume       = 5580,
+  series       = "Lecture Notes in Computer Science",
+  publisher    = "Springer",
+  isbn        = "978-3-642-02383-5",
+  ee          = "http://dx.doi.org/10.1007/978-3-642-02384-2",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
 }
 
 @Proceedings{DBLP:conf/eurocrypt/2008,
-  editor =      "Nigel P. Smart",
-  title =       "Advances in Cryptology - EUROCRYPT 2008, 27th Annual
+  title               = "Advances in Cryptology - EUROCRYPT 2008, 27th Annual
                   International Conference on the Theory and Applications of
                   Cryptographic Techniques, Istanbul, Turkey, April 13-17,
                   2008. Proceedings",
-  booktitle =   "EUROCRYPT",
-  publisher =   "Springer",
-  series =      "Lecture Notes in Computer Science",
-  volume =      4965,
-  year =        2008,
-  isbn =        "978-3-540-78966-6",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
+  year        = 2008,
+  booktitle    = "EUROCRYPT",
+  editor       = "Nigel P. Smart",
+  volume       = 4965,
+  series       = "Lecture Notes in Computer Science",
+  publisher    = "Springer",
+  isbn        = "978-3-540-78966-6",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
 }
 
 @Proceedings{DBLP:conf/fse/2001,
-  editor =      "Mitsuru Matsui",
-  title =       "Fast Software Encryption, 8th International Workshop, FSE
+  title               = "Fast Software Encryption, 8th International Workshop, FSE
                   2001 Yokohama, Japan, April 2-4, 2001, Revised Papers",
-  booktitle =   "FSE",
-  publisher =   "Springer",
-  series =      "Lecture Notes in Computer Science",
-  volume =      2355,
-  year =        2002,
-  isbn =        "3-540-43869-6",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
+  year        = 2002,
+  booktitle    = "FSE",
+  editor       = "Mitsuru Matsui",
+  volume       = 2355,
+  series       = "Lecture Notes in Computer Science",
+  publisher    = "Springer",
+  isbn        = "3-540-43869-6",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
+}
+
+@Proceedings{DBLP:conf/fse/2005,
+  title               = "Fast Software Encryption: 12th International Workshop,
+                  {FSE} 2005, Paris, France, February 21-23, 2005, Revised
+                  Selected Papers",
+  year        = 2005,
+  editor       = "Henri Gilbert and Helena Handschuh",
+  volume       = 3557,
+  series       = "Lecture Notes in Computer Science",
+  publisher    = "Springer",
+  url         = "https://doi.org/10.1007/b137506",
+  doi         = "10.1007/b137506",
+  isbn        = "3-540-26541-4",
+  timestamp    = "Tue, 30 May 2017 16:36:53 +0200",
+  biburl       = "http://dblp.uni-trier.de/rec/bib/conf/fse/2005",
+  bibsource    = "dblp computer science bibliography, http://dblp.org"
 }
 
 @Proceedings{DBLP:conf/indocrypt/2004,
-  editor =      "Anne Canteaut and Kapalee Viswanathan",
-  title =       "Progress in Cryptology - INDOCRYPT 2004, 5th International
-                  Conference on Cryptology in India, Chennai, India, December
-                  20-22, 2004, Proceedings",
-  booktitle =   "INDOCRYPT",
-  publisher =   "Springer",
-  series =      "Lecture Notes in Computer Science",
-  volume =      3348,
-  year =        2004,
-  isbn =        "3-540-24130-2",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
+  title               = "Progress in Cryptology - INDOCRYPT 2004, 5th International
+                  Conference on Cryptology in India, Chennai, India,
+                  December 20-22, 2004, Proceedings",
+  year        = 2004,
+  booktitle    = "INDOCRYPT",
+  editor       = "Anne Canteaut and Kapalee Viswanathan",
+  volume       = 3348,
+  series       = "Lecture Notes in Computer Science",
+  publisher    = "Springer",
+  isbn        = "3-540-24130-2",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
 }
 
 @Proceedings{DBLP:conf/pkc/2006,
-  editor =      "Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal
-                  Malkin",
-  title =       "Public Key Cryptography - {PKC} 2006, 9th International
+  title               = "Public Key Cryptography - {PKC} 2006, 9th International
                   Conference on Theory and Practice of Public-Key
                   Cryptography, New York, NY, USA, April 24-26, 2006,
                   Proceedings",
-  series =      "Lecture Notes in Computer Science",
-  volume =      3958,
-  publisher =   "Springer",
-  year =        2006,
-  url =                 "https://doi.org/10.1007/11745853",
-  doi =                 "10.1007/11745853",
-  isbn =        "3-540-33851-9",
-  timestamp =   "Tue, 30 May 2017 16:36:52 +0200",
-  biburl =      "http://dblp.uni-trier.de/rec/bib/conf/pkc/2006",
-  bibsource =   "dblp computer science bibliography, http://dblp.org"
+  year        = 2006,
+  editor       = "Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal
+                  Malkin",
+  volume       = 3958,
+  series       = "Lecture Notes in Computer Science",
+  publisher    = "Springer",
+  url         = "https://doi.org/10.1007/11745853",
+  doi         = "10.1007/11745853",
+  isbn        = "3-540-33851-9",
+  timestamp    = "Tue, 30 May 2017 16:36:52 +0200",
+  biburl       = "http://dblp.uni-trier.de/rec/bib/conf/pkc/2006",
+  bibsource    = "dblp computer science bibliography, http://dblp.org"
 }
 
 @Proceedings{DBLP:conf/wpes/2004,
-  editor =      "Vijay Atluri and Paul F. Syverson and Sabrina De Capitani
+  title               = "Proceedings of the 2004 ACM Workshop on Privacy in the
+                  Electronic Society, WPES 2004, Washington, DC, USA,
+                  October 28, 2004",
+  year        = 2004,
+  booktitle    = "WPES",
+  editor       = "Vijay Atluri and Paul F. Syverson and Sabrina De Capitani
                   di Vimercati",
-  title =       "Proceedings of the 2004 ACM Workshop on Privacy in the
-                  Electronic Society, WPES 2004, Washington, DC, USA, October
-                  28, 2004",
-  booktitle =   "WPES",
-  publisher =   "ACM",
-  year =        2004,
-  isbn =        "1-58113-968-3",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
+  publisher    = "ACM",
+  isbn        = "1-58113-968-3",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
 }
 
 @Proceedings{DBLP:conf/wpes/2007,
-  editor =      "Peng Ning and Ting Yu",
-  title =       "Proceedings of the 2007 ACM Workshop on Privacy in the
-                  Electronic Society, WPES 2007, Alexandria, VA, USA, October
-                  29, 2007",
-  booktitle =   "WPES",
-  publisher =   "ACM",
-  year =        2007,
-  isbn =        "978-1-59593-883-1",
-  bibsource =   "DBLP, http://dblp.uni-trier.de"
+  title               = "Proceedings of the 2007 ACM Workshop on Privacy in the
+                  Electronic Society, WPES 2007, Alexandria, VA, USA,
+                  October 29, 2007",
+  year        = 2007,
+  booktitle    = "WPES",
+  editor       = "Peng Ning and Ting Yu",
+  publisher    = "ACM",
+  isbn        = "978-1-59593-883-1",
+  bibsource    = "DBLP, http://dblp.uni-trier.de"
 }
 
 %%%--------------------------------------------------------------------------