BibTeX records: Pankaj Rohatgi

download as .bib file

@article{DBLP:journals/iacr/SaabRH16,
  author       = {Sami Saab and
                  Pankaj Rohatgi and
                  Craig Hampel},
  title        = {Side-Channel Protections for Cryptographic Instruction Set Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {700},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/700},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaabRH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2013,
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08302-5},
  doi          = {10.1007/978-3-319-08302-5},
  isbn         = {978-3-319-08301-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KocherJJR11,
  author       = {Paul C. Kocher and
                  Joshua Jaffe and
                  Benjamin Jun and
                  Pankaj Rohatgi},
  title        = {Introduction to differential power analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {5--27},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0006-y},
  doi          = {10.1007/S13389-011-0006-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KocherJJR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ChariDKPRRRSST10,
  author       = {Suresh Chari and
                  Vincenzo V. Diluoffo and
                  Paul A. Karger and
                  Elaine R. Palmer and
                  Tal Rabin and
                  Josyula R. Rao and
                  Pankaj Rohatgi and
                  Helmut Scherzer and
                  Michael Steiner and
                  David C. Toll},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {Designing a Side Channel Resistant Random Number Generator},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_5},
  doi          = {10.1007/978-3-642-12510-2\_5},
  timestamp    = {Sat, 30 May 2020 20:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/ChariDKPRRRSST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/NiLCRB09,
  author       = {Qun Ni and
                  Jorge Lobo and
                  Seraphin B. Calo and
                  Pankaj Rohatgi and
                  Elisa Bertino},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {Automating role-based provisioning by learning from examples},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542222},
  doi          = {10.1145/1542207.1542222},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/NiLCRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/FokoueSRWY09,
  author       = {Achille Fokoue and
                  Mudhakar Srivatsa and
                  Pankaj Rohatgi and
                  Peter Wrobel and
                  John Yesberg},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {A decision support system for secure information sharing},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {105--114},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542226},
  doi          = {10.1145/1542207.1542226},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/FokoueSRWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Rohatgi09,
  author       = {Pankaj Rohatgi},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Improved Techniques for Side-Channel Analysis},
  booktitle    = {Cryptographic Engineering},
  pages        = {381--406},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_14},
  doi          = {10.1007/978-0-387-71817-0\_14},
  timestamp    = {Tue, 26 Jun 2018 16:12:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Rohatgi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Rohatgi09a,
  author       = {Pankaj Rohatgi},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Electromagnetic Attacks and Countermeasures},
  booktitle    = {Cryptographic Engineering},
  pages        = {407--430},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_15},
  doi          = {10.1007/978-0-387-71817-0\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Rohatgi09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SrivatsaBPR08,
  author       = {Mudhakar Srivatsa and
                  Shane Balfe and
                  Kenneth G. Paterson and
                  Pankaj Rohatgi},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Trust management for secure information flows},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {175--188},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455794},
  doi          = {10.1145/1455770.1455794},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SrivatsaBPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/LimCCR08,
  author       = {Yow Tzu Lim and
                  Pau{-}Chen Cheng and
                  John Andrew Clark and
                  Pankaj Rohatgi},
  title        = {Policy evolution with Genetic Programming: {A} comparison of three
                  approaches},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2008, June 1-6, 2008, Hong Kong, China},
  pages        = {1792--1800},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CEC.2008.4631032},
  doi          = {10.1109/CEC.2008.4631032},
  timestamp    = {Thu, 16 Dec 2021 14:01:33 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/LimCCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/LimCRC08,
  author       = {Yow Tzu Lim and
                  Pau{-}Chen Cheng and
                  Pankaj Rohatgi and
                  John Andrew Clark},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {{MLS} security policy evolution with genetic programming},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {1571--1578},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389395},
  doi          = {10.1145/1389095.1389395},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/LimCRC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/SrivatsaRBR08,
  author       = {Mudhakar Srivatsa and
                  Pankaj Rohatgi and
                  Shane Balfe and
                  Steffen Reidt},
  title        = {Securing information flows: {A} metadata framework},
  booktitle    = {{IEEE} 5th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2008, 29 September - 2 October 2008, Atlanta, Georgia, {USA}},
  pages        = {748--753},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MAHSS.2008.4660114},
  doi          = {10.1109/MAHSS.2008.4660114},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/SrivatsaRBR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/MolloyCR08,
  author       = {Ian M. Molloy and
                  Pau{-}Chen Cheng and
                  Pankaj Rohatgi},
  editor       = {Matt Bishop and
                  Christian W. Probst and
                  Angelos D. Keromytis and
                  Anil Somayaji},
  title        = {Trading in risk: using markets to improve access control},
  booktitle    = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe,
                  CA, USA, September 22-25, 2008},
  pages        = {107--125},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1595676.1595694},
  doi          = {10.1145/1595676.1595694},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/MolloyCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seal/LimCCR08,
  author       = {Yow Tzu Lim and
                  Pau{-}Chen Cheng and
                  John Andrew Clark and
                  Pankaj Rohatgi},
  editor       = {Xiaodong Li and
                  Michael Kirley and
                  Mengjie Zhang and
                  David G. Green and
                  Victor Ciesielski and
                  Hussein A. Abbass and
                  Zbigniew Michalewicz and
                  Tim Hendtlass and
                  Kalyanmoy Deb and
                  Kay Chen Tan and
                  J{\"{u}}rgen Branke and
                  Yuhui Shi},
  title        = {Policy Evolution with Grammatical Evolution},
  booktitle    = {Simulated Evolution and Learning, 7th International Conference, {SEAL}
                  2008, Melbourne, Australia, December 7-10, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5361},
  pages        = {71--80},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89694-4\_8},
  doi          = {10.1007/978-3-540-89694-4\_8},
  timestamp    = {Tue, 16 Feb 2021 15:53:52 +0100},
  biburl       = {https://dblp.org/rec/conf/seal/LimCCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2008,
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3},
  doi          = {10.1007/978-3-540-85053-3},
  isbn         = {978-3-540-85052-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/ZhangMRG07,
  author       = {Xiaolan Zhang and
                  Suzanne McIntosh and
                  Pankaj Rohatgi and
                  John Linwood Griffin},
  editor       = {Renato Cerqueira and
                  Roy H. Campbell},
  title        = {XenSocket: {A} High-Throughput Interdomain Transport for Virtual Machines},
  booktitle    = {Middleware 2007, {ACM/IFIP/USENIX} 8th International Middleware Conference,
                  Newport Beach, CA, USA, November 26-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4834},
  pages        = {184--203},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76778-7\_10},
  doi          = {10.1007/978-3-540-76778-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/ZhangMRG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChengRKKWR07,
  author       = {Pau{-}Chen Cheng and
                  Pankaj Rohatgi and
                  Claudia Keser and
                  Paul A. Karger and
                  Grant M. Wagner and
                  Angela Schuett Reninger},
  title        = {Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive
                  Access Control},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {222--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.21},
  doi          = {10.1109/SP.2007.21},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChengRKKWR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AgrawalBKRS07,
  author       = {Dakshi Agrawal and
                  Sel{\c{c}}uk Baktir and
                  Deniz Karakoyunlu and
                  Pankaj Rohatgi and
                  Berk Sunar},
  title        = {Trojan Detection using {IC} Fingerprinting},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {296--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.36},
  doi          = {10.1109/SP.2007.36},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AgrawalBKRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AgrawalRRS05,
  author       = {Dakshi Agrawal and
                  Josyula R. Rao and
                  Pankaj Rohatgi and
                  Kai Schramm},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Templates as Master Keys},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_2},
  doi          = {10.1007/11545262\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AgrawalRRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ReiterR04,
  author       = {Michael K. Reiter and
                  Pankaj Rohatgi},
  title        = {Homeland Security},
  journal      = {{IEEE} Internet Comput.},
  volume       = {8},
  number       = {6},
  pages        = {16--17},
  year         = {2004},
  url          = {https://doi.org/10.1109/MIC.2004.62},
  doi          = {10.1109/MIC.2004.62},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ReiterR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AgrawalRR03,
  author       = {Dakshi Agrawal and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Multi-channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {2--16},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_2},
  doi          = {10.1007/978-3-540-45238-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AgrawalRR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChariRR02,
  author       = {Suresh Chari and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Template Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {13--28},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_3},
  doi          = {10.1007/3-540-36400-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ChariRR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AgrawalARR02,
  author       = {Dakshi Agrawal and
                  Bruce Archambeault and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {The {EM} Side-Channel(s)},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {29--45},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_4},
  doi          = {10.1007/3-540-36400-5\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AgrawalARR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RaoRST02,
  author       = {Josyula R. Rao and
                  Pankaj Rohatgi and
                  Helmut Scherzer and
                  St{\'{e}}phane Tinguely},
  title        = {Partitioning Attacks: Or How to Rapidly Clone Some {GSM} Cards},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {31--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004360},
  doi          = {10.1109/SECPRI.2002.1004360},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RaoRST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/GennaroR01,
  author       = {Rosario Gennaro and
                  Pankaj Rohatgi},
  title        = {How to Sign Digital Streams},
  journal      = {Inf. Comput.},
  volume       = {165},
  number       = {1},
  pages        = {100--116},
  year         = {2001},
  url          = {https://doi.org/10.1006/inco.2000.2916},
  doi          = {10.1006/INCO.2000.2916},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/GennaroR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RudraDJKRR01,
  author       = {Atri Rudra and
                  Pradeep K. Dubey and
                  Charanjit S. Jutla and
                  Vijay Kumar and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Efficient Rijndael Encryption Implementation with Composite Field
                  Arithmetic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {171--184},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_16},
  doi          = {10.1007/3-540-44709-1\_16},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/RudraDJKRR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaoR01,
  author       = {Josyula R. Rao and
                  Pankaj Rohatgi},
  title        = {EMpowering Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaoR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ChariRS00,
  author       = {Suresh Chari and
                  Pankaj Rohatgi and
                  Aravind Srinivasan},
  title        = {Improved Algorithms via Approximations of Probability Distributions},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {61},
  number       = {1},
  pages        = {81--107},
  year         = {2000},
  url          = {https://doi.org/10.1006/jcss.1999.1695},
  doi          = {10.1006/JCSS.1999.1695},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/ChariRS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/GuptaRA00,
  author       = {Anshul Gupta and
                  Pankaj Rohatgi and
                  Ramesh C. Agarwal},
  editor       = {Carlo Traverso},
  title        = {Fast practical algorithms for the Boolean-product-witness-matrix problem},
  booktitle    = {Proceedings of the 2000 International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} 2000, St. Andrews, United Kingdom, August 6-10,
                  2000},
  pages        = {146--152},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/345542.345611},
  doi          = {10.1145/345542.345611},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issac/GuptaRA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CanettiCGPRRS00,
  author       = {Ran Canetti and
                  Pau{-}Chen Cheng and
                  Frederique Giraud and
                  Dimitrios E. Pendarakis and
                  Josyula R. Rao and
                  Pankaj Rohatgi and
                  Debanjan Saha},
  title        = {An IPSec-based Host Architecture for Secure Internet Multicast},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2000, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2000},
  url          = {https://www.ndss-symposium.org/ndss2000/ipsec-based-host-architecture-secure-internet-multicast-paper/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CanettiCGPRRS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RaoR00,
  author       = {Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {Steven M. Bellovin and
                  Greg Rose},
  title        = {Can Pseudonymity Really Guarantee Privacy?},
  booktitle    = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
                  2000},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {https://www.usenix.org/conference/9th-usenix-security-symposium/can-pseudonymity-really-guarantee-privacy},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RaoR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/MoyerRR99,
  author       = {Matthew J. Moyer and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  title        = {A survey of security issues in multicast communications},
  journal      = {{IEEE} Netw.},
  volume       = {13},
  number       = {6},
  pages        = {12--23},
  year         = {1999},
  url          = {https://doi.org/10.1109/65.806981},
  doi          = {10.1109/65.806981},
  timestamp    = {Thu, 01 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/MoyerRR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Rohatgi99,
  author       = {Pankaj Rohatgi},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {93--100},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319722},
  doi          = {10.1145/319709.319722},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Rohatgi99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChariJRR99,
  author       = {Suresh Chari and
                  Charanjit S. Jutla and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {Michael J. Wiener},
  title        = {Towards Sound Approaches to Counteract Power-Analysis Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {398--412},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_26},
  doi          = {10.1007/3-540-48405-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChariJRR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GennaroR97,
  author       = {Rosario Gennaro and
                  Pankaj Rohatgi},
  editor       = {Burton S. Kaliski Jr.},
  title        = {How to Sign Digital Streams},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {180--197},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052235},
  doi          = {10.1007/BFB0052235},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GennaroR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ChariR96,
  author       = {Suresh Chari and
                  Pankaj Rohatgi},
  title        = {On Completeness Under Random Reductions},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {545--555},
  year         = {1996},
  url          = {https://doi.org/10.1006/jcss.1996.0086},
  doi          = {10.1006/JCSS.1996.0086},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/ChariR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ChangKR95,
  author       = {Richard Chang and
                  Jim Kadin and
                  Pankaj Rohatgi},
  title        = {On Unique Satisfiability and the Threshold Behavior of Randomized
                  Reductions},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {50},
  number       = {3},
  pages        = {359--373},
  year         = {1995},
  url          = {https://doi.org/10.1006/jcss.1995.1028},
  doi          = {10.1006/JCSS.1995.1028},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/ChangKR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/Rohatgi95,
  author       = {Pankaj Rohatgi},
  title        = {Saving Queries with Randomness},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {50},
  number       = {3},
  pages        = {476--492},
  year         = {1995},
  url          = {https://doi.org/10.1006/jcss.1995.1038},
  doi          = {10.1006/JCSS.1995.1038},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/Rohatgi95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/ChariRS95,
  author       = {Suresh Chari and
                  Pankaj Rohatgi and
                  Aravind Srinivasan},
  title        = {Randomness-Optimal Unique Element Isolation with Applications to Perfect
                  Matching and Related Problems},
  journal      = {{SIAM} J. Comput.},
  volume       = {24},
  number       = {5},
  pages        = {1036--1050},
  year         = {1995},
  url          = {https://doi.org/10.1137/S0097539793250330},
  doi          = {10.1137/S0097539793250330},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/ChariRS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Rohatgi94,
  author       = {Pankaj Rohatgi},
  title        = {On Properties of Random Reductions},
  school       = {Cornell University, {USA}},
  year         = {1994},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Rohatgi94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ChangCGHHRR94,
  author       = {Richard Chang and
                  Benny Chor and
                  Oded Goldreich and
                  Juris Hartmanis and
                  Johan H{\aa}stad and
                  Desh Ranjan and
                  Pankaj Rohatgi},
  title        = {The Random Oracle Hypothesis Is False},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {49},
  number       = {1},
  pages        = {24--39},
  year         = {1994},
  url          = {https://doi.org/10.1016/S0022-0000(05)80084-4},
  doi          = {10.1016/S0022-0000(05)80084-4},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/ChangCGHHRR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ChariRS94,
  author       = {Suresh Chari and
                  Pankaj Rohatgi and
                  Aravind Srinivasan},
  editor       = {Frank Thomson Leighton and
                  Michael T. Goodrich},
  title        = {Improved algorithms via approximations of probability distributions
                  (extended abstract)},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of
                  Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  pages        = {584--592},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/195058.195411},
  doi          = {10.1145/195058.195411},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/ChariRS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/RanjanCR93,
  author       = {Desh Ranjan and
                  Suresh Chari and
                  Pankaj Rohatgi},
  title        = {Improving Known Solutions is Hard},
  journal      = {Comput. Complex.},
  volume       = {3},
  pages        = {168--185},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01200119},
  doi          = {10.1007/BF01200119},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/RanjanCR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/ChariR93,
  author       = {Suresh Chari and
                  Pankaj Rohatgi},
  title        = {On Completeness under Random Reductions},
  booktitle    = {Proceedings of the Eigth Annual Structure in Complexity Theory Conference,
                  San Diego, CA, USA, May 18-21, 1993},
  pages        = {176--184},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/SCT.1993.336529},
  doi          = {10.1109/SCT.1993.336529},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/ChariR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ChariRS93,
  author       = {Suresh Chari and
                  Pankaj Rohatgi and
                  Aravind Srinivasan},
  editor       = {S. Rao Kosaraju and
                  David S. Johnson and
                  Alok Aggarwal},
  title        = {Randomness-optimal unique element isolation, with applications to
                  perfect matching and related problems},
  booktitle    = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of
                  Computing, May 16-18, 1993, San Diego, CA, {USA}},
  pages        = {458--467},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/167088.167213},
  doi          = {10.1145/167088.167213},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/ChariRS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/wsscs/HartmanisCRR93,
  author       = {Juris Hartmanis and
                  Richard Chang and
                  Desh Ranjan and
                  Pankaj Rohatgi},
  editor       = {Grzegorz Rozenberg and
                  Arto Salomaa},
  title        = {On {IP} = {PSPACE} and Theorems with Narrow Proofs},
  booktitle    = {Current Trends in Theoretical Computer Science - Essays and Tutorials},
  series       = {World Scientific Series in Computer Science},
  volume       = {40},
  pages        = {484--493},
  publisher    = {World Scientific},
  year         = {1993},
  url          = {https://doi.org/10.1142/9789812794499\_0036},
  doi          = {10.1142/9789812794499\_0036},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/wsscs/HartmanisCRR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/wsscs/ChangR93,
  author       = {Richard Chang and
                  Pankaj Rohatgi},
  editor       = {Grzegorz Rozenberg and
                  Arto Salomaa},
  title        = {On Unique Satisfiability and Randomized Reductions},
  booktitle    = {Current Trends in Theoretical Computer Science - Essays and Tutorials},
  series       = {World Scientific Series in Computer Science},
  volume       = {40},
  pages        = {494--503},
  publisher    = {World Scientific},
  year         = {1993},
  url          = {https://doi.org/10.1142/9789812794499\_0037},
  doi          = {10.1142/9789812794499\_0037},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/wsscs/ChangR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/wsscs/HartmanisCCRR93,
  author       = {Juris Hartmanis and
                  Richard Chang and
                  Suresh Chari and
                  Desh Ranjan and
                  Pankaj Rohatgi},
  editor       = {Grzegorz Rozenberg and
                  Arto Salomaa},
  title        = {Relativization: a Revisionistic Retrospective},
  booktitle    = {Current Trends in Theoretical Computer Science - Essays and Tutorials},
  series       = {World Scientific Series in Computer Science},
  volume       = {40},
  pages        = {537--548},
  publisher    = {World Scientific},
  year         = {1993},
  url          = {https://doi.org/10.1142/9789812794499\_0040},
  doi          = {10.1142/9789812794499\_0040},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/wsscs/HartmanisCCRR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eatcs/ChangCRR92,
  author       = {Richard Chang and
                  Suresh Chari and
                  Desh Ranjan and
                  Pankaj Rohatgi},
  title        = {Relativization: a revisionistic retrospective},
  journal      = {Bull. {EATCS}},
  volume       = {47},
  pages        = {144--153},
  year         = {1992},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eatcs/ChangCRR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/Rohatgi92,
  author       = {Pankaj Rohatgi},
  title        = {Saving Queries with Randomness},
  booktitle    = {Proceedings of the Seventh Annual Structure in Complexity Theory Conference,
                  Boston, Massachusetts, USA, June 22-25, 1992},
  pages        = {71--83},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/SCT.1992.215382},
  doi          = {10.1109/SCT.1992.215382},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/Rohatgi92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/RanjanR92,
  author       = {Desh Ranjan and
                  Pankaj Rohatgi},
  title        = {On Randomized Reductions to Sparse Sets},
  booktitle    = {Proceedings of the Seventh Annual Structure in Complexity Theory Conference,
                  Boston, Massachusetts, USA, June 22-25, 1992},
  pages        = {239--242},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/SCT.1992.215397},
  doi          = {10.1109/SCT.1992.215397},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/RanjanR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/ChariRR92,
  author       = {Suresh Chari and
                  Desh Ranjan and
                  Pankaj Rohatgi},
  editor       = {Ivan M. Havel and
                  V{\'{a}}clav Koubek},
  title        = {On the Complexity of Incremental Computation},
  booktitle    = {Mathematical Foundations of Computer Science 1992, 17th International
                  Symposium, MFCS'92, Prague, Czechoslovakia, August 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {629},
  pages        = {172--180},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55808-X\_15},
  doi          = {10.1007/3-540-55808-X\_15},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/ChariRR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/ChangKR91,
  author       = {Richard Chang and
                  Jim Kadin and
                  Pankaj Rohatgi},
  title        = {Connections between the Complexity of Unique Satisfiability and the
                  Threshold Behavior of Randomized Reductions},
  booktitle    = {Proceedings of the Sixth Annual Structure in Complexity Theory Conference,
                  Chicago, Illinois, USA, June 30 - July 3, 1991},
  pages        = {255--269},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SCT.1991.160268},
  doi          = {10.1109/SCT.1991.160268},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/ChangKR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/RanjanCR91,
  author       = {Desh Ranjan and
                  Suresh Chari and
                  Pankaj Rohatgi},
  editor       = {Javier Leach Albert and
                  Burkhard Monien and
                  Mario Rodr{\'{\i}}guez{-}Artalejo},
  title        = {Improving Known Solutions is Hard},
  booktitle    = {Automata, Languages and Programming, 18th International Colloquium,
                  ICALP91, Madrid, Spain, July 8-12, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {510},
  pages        = {381--392},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54233-7\_149},
  doi          = {10.1007/3-540-54233-7\_149},
  timestamp    = {Fri, 17 Jul 2020 16:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/RanjanCR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eatcs/HartmanisCRR90,
  author       = {Juris Hartmanis and
                  Richard Chang and
                  Desh Ranjan and
                  Pankaj Rohatgi},
  title        = {On Unique Staisfiability and Randomized Reductions},
  journal      = {Bull. {EATCS}},
  volume       = {41},
  pages        = {166--174},
  year         = {1990},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eatcs/HartmanisCRR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eatcs/ChangR90,
  author       = {Richard Chang and
                  Pankaj Rohatgi},
  title        = {On Unique Staisfiability and Randomized Reductions},
  journal      = {Bull. {EATCS}},
  volume       = {42},
  pages        = {151--159},
  year         = {1990},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eatcs/ChangR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swat/HartmanisCRR90,
  author       = {Juris Hartmanis and
                  Richard Chang and
                  Desh Ranjan and
                  Pankaj Rohatgi},
  editor       = {John R. Gilbert and
                  Rolf G. Karlsson},
  title        = {Structural Complexity Theory: recent Surprises},
  booktitle    = {{SWAT} 90, 2nd Scandinavian Workshop on Algorithm Theory, Bergen,
                  Norway, July 11-14, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {447},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-52846-6\_73},
  doi          = {10.1007/3-540-52846-6\_73},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/swat/HartmanisCRR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics