Search dblp for Publications

export results for "toc:db/conf/eurocrypt/eurocrypt2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/eurocrypt/AhmadiS11,
  author       = {Hadi Ahmadi and
                  Reihaneh Safavi{-}Naini},
  editor       = {Kenneth G. Paterson},
  title        = {Secret Keys from Channel Noise},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {266--283},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_16},
  doi          = {10.1007/978-3-642-20465-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AhmadiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Applebaum11,
  author       = {Benny Applebaum},
  editor       = {Kenneth G. Paterson},
  title        = {Key-Dependent Message Security: Generic Amplification and Completeness},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {527--546},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_29},
  doi          = {10.1007/978-3-642-20465-4\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Applebaum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AranhaKLGL11,
  author       = {Diego F. Aranha and
                  Koray Karabina and
                  Patrick Longa and
                  Catherine H. Gebotys and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez},
  editor       = {Kenneth G. Paterson},
  title        = {Faster Explicit Formulas for Computing Pairings over Ordinary Curves},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {48--68},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_5},
  doi          = {10.1007/978-3-642-20465-4\_5},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AranhaKLGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AsharovCH11,
  author       = {Gilad Asharov and
                  Ran Canetti and
                  Carmit Hazay},
  editor       = {Kenneth G. Paterson},
  title        = {Towards a Game Theoretic View of Secure Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {426--445},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_24},
  doi          = {10.1007/978-3-642-20465-4\_24},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AsharovCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BeckerCJ11,
  author       = {Anja Becker and
                  Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux},
  editor       = {Kenneth G. Paterson},
  title        = {Improved Generic Algorithms for Hard Knapsacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {364--385},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_21},
  doi          = {10.1007/978-3-642-20465-4\_21},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BeckerCJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BendlinDOZ11,
  author       = {Rikke Bendlin and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Sarah Zakarias},
  editor       = {Kenneth G. Paterson},
  title        = {Semi-homomorphic Encryption and Multiparty Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {169--188},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_11},
  doi          = {10.1007/978-3-642-20465-4\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BendlinDOZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehF11,
  author       = {Dan Boneh and
                  David Mandell Freeman},
  editor       = {Kenneth G. Paterson},
  title        = {Homomorphic Signatures for Polynomial Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {149--168},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_10},
  doi          = {10.1007/978-3-642-20465-4\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoumanF11,
  author       = {Niek J. Bouman and
                  Serge Fehr},
  editor       = {Kenneth G. Paterson},
  title        = {Secure Authentication from a Weak Key, without Leaking Information},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {246--265},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_15},
  doi          = {10.1007/978-3-642-20465-4\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoumanF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyleSW11,
  author       = {Elette Boyle and
                  Gil Segev and
                  Daniel Wichs},
  editor       = {Kenneth G. Paterson},
  title        = {Fully Leakage-Resilient Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_7},
  doi          = {10.1007/978-3-642-20465-4\_7},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyleSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CatalanoFW11,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  editor       = {Kenneth G. Paterson},
  title        = {Adaptive Pseudo-free Groups and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {207--223},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_13},
  doi          = {10.1007/978-3-642-20465-4\_13},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CatalanoFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Cramer11,
  author       = {Ronald Cramer},
  editor       = {Kenneth G. Paterson},
  title        = {The Arithmetic Codex: Theory and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {1},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_1},
  doi          = {10.1007/978-3-642-20465-4\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Cramer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisS11,
  author       = {Yevgeniy Dodis and
                  John P. Steinberger},
  editor       = {Kenneth G. Paterson},
  title        = {Domain Extension for MACs Beyond the Birthday Barrier},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {323--342},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_19},
  doi          = {10.1007/978-3-642-20465-4\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DurmuthF11,
  author       = {Markus D{\"{u}}rmuth and
                  David Mandell Freeman},
  editor       = {Kenneth G. Paterson},
  title        = {Deniable Encryption with Negligible Detection Probability: An Interactive
                  Construction},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {610--626},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_33},
  doi          = {10.1007/978-3-642-20465-4\_33},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DurmuthF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Fuchsbauer11,
  author       = {Georg Fuchsbauer},
  editor       = {Kenneth G. Paterson},
  title        = {Commuting Signatures and Verifiable Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {224--245},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_14},
  doi          = {10.1007/978-3-642-20465-4\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Fuchsbauer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryH11,
  author       = {Craig Gentry and
                  Shai Halevi},
  editor       = {Kenneth G. Paterson},
  title        = {Implementing Gentry's Fully-Homomorphic Encryption Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {129--148},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_9},
  doi          = {10.1007/978-3-642-20465-4\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IshaiKOPS11,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Non-interactive Secure Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {406--425},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_23},
  doi          = {10.1007/978-3-642-20465-4\_23},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IshaiKOPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  David Cash and
                  Abhishek Jain and
                  Daniele Venturi},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Authentication from Hard Learning Problems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {7--26},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_3},
  doi          = {10.1007/978-3-642-20465-4\_3},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Leander11,
  author       = {Gregor Leander},
  editor       = {Kenneth G. Paterson},
  title        = {On Linear Hulls, Statistical Saturation Attacks, {PRESENT} and a Cryptanalysis
                  of {PUFFIN}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {303--322},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_18},
  doi          = {10.1007/978-3-642-20465-4\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Leander11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoW11,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Kenneth G. Paterson},
  title        = {Unbounded {HIBE} and Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {547--567},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_30},
  doi          = {10.1007/978-3-642-20465-4\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoW11a,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Kenneth G. Paterson},
  title        = {Decentralizing Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {568--588},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_31},
  doi          = {10.1007/978-3-642-20465-4\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Lindell11,
  author       = {Yehuda Lindell},
  editor       = {Kenneth G. Paterson},
  title        = {Highly-Efficient Universally-Composable Commitments Based on the {DDH}
                  Assumption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {446--466},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_25},
  doi          = {10.1007/978-3-642-20465-4\_25},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Lindell11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MalkinTY11,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Moti Yung},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Circuit-Size Independent Public Key Encryption with {KDM}
                  Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {507--526},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_28},
  doi          = {10.1007/978-3-642-20465-4\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MalkinTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MoradiPLPW11,
  author       = {Amir Moradi and
                  Axel Poschmann and
                  San Ling and
                  Christof Paar and
                  Huaxiong Wang},
  editor       = {Kenneth G. Paterson},
  title        = {Pushing the Limits: {A} Very Compact and a Threshold Implementation
                  of {AES}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {69--88},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_6},
  doi          = {10.1007/978-3-642-20465-4\_6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MoradiPLPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Nguyen11,
  author       = {Phong Q. Nguyen},
  editor       = {Kenneth G. Paterson},
  title        = {Lattice Reduction Algorithms: Theory and Practice},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {2--6},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_2},
  doi          = {10.1007/978-3-642-20465-4\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Nguyen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Obana11,
  author       = {Satoshi Obana},
  editor       = {Kenneth G. Paterson},
  title        = {Almost Optimum \emph{t}-Cheater Identifiable Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {284--302},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_17},
  doi          = {10.1007/978-3-642-20465-4\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Obana11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RenauldSVKF11,
  author       = {Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Dina Kamel and
                  Denis Flandre},
  editor       = {Kenneth G. Paterson},
  title        = {A Formal Study of Power Variability Issues and Side-Channel Attacks
                  for Nanoscale Devices},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_8},
  doi          = {10.1007/978-3-642-20465-4\_8},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RenauldSVKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RistenpartSS11,
  author       = {Thomas Ristenpart and
                  Hovav Shacham and
                  Thomas Shrimpton},
  editor       = {Kenneth G. Paterson},
  title        = {Careful with Composition: Limitations of the Indifferentiability Framework},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {487--506},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_27},
  doi          = {10.1007/978-3-642-20465-4\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RistenpartSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Schage11,
  author       = {Sven Sch{\"{a}}ge},
  editor       = {Kenneth G. Paterson},
  title        = {Tight Proofs for Signature Schemes without Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_12},
  doi          = {10.1007/978-3-642-20465-4\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Schage11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SepehrdadVV11,
  author       = {Pouyan Sepehrdad and
                  Serge Vaudenay and
                  Martin Vuagnoux},
  editor       = {Kenneth G. Paterson},
  title        = {Statistical Attack on {RC4} - Distinguishing {WPA}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {343--363},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_20},
  doi          = {10.1007/978-3-642-20465-4\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SepehrdadVV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ShelatS11,
  author       = {Abhi Shelat and
                  Chih{-}Hao Shen},
  editor       = {Kenneth G. Paterson},
  title        = {Two-Output Secure Computation with Malicious Adversaries},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {386--405},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_22},
  doi          = {10.1007/978-3-642-20465-4\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ShelatS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/StehleS11,
  author       = {Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  editor       = {Kenneth G. Paterson},
  title        = {Making {NTRU} as Secure as Worst-Case Problems over Ideal Lattices},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {27--47},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_4},
  doi          = {10.1007/978-3-642-20465-4\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/StehleS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Unruh11,
  author       = {Dominique Unruh},
  editor       = {Kenneth G. Paterson},
  title        = {Concurrent Composition in the Bounded Quantum Storage Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {467--486},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_26},
  doi          = {10.1007/978-3-642-20465-4\_26},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Unruh11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Wee11,
  author       = {Hoeteck Wee},
  editor       = {Kenneth G. Paterson},
  title        = {Threshold and Revocation Cryptosystems via Extractable Hash Proofs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {589--609},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_32},
  doi          = {10.1007/978-3-642-20465-4\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Wee11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2011,
  editor       = {Kenneth G. Paterson},
  title        = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4},
  doi          = {10.1007/978-3-642-20465-4},
  isbn         = {978-3-642-20464-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics