Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/eurocrypt/eurocrypt2011.bht:"
@inproceedings{DBLP:conf/eurocrypt/AhmadiS11, author = {Hadi Ahmadi and Reihaneh Safavi{-}Naini}, editor = {Kenneth G. Paterson}, title = {Secret Keys from Channel Noise}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {266--283}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_16}, doi = {10.1007/978-3-642-20465-4\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AhmadiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Applebaum11, author = {Benny Applebaum}, editor = {Kenneth G. Paterson}, title = {Key-Dependent Message Security: Generic Amplification and Completeness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {527--546}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_29}, doi = {10.1007/978-3-642-20465-4\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Applebaum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AranhaKLGL11, author = {Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez}, editor = {Kenneth G. Paterson}, title = {Faster Explicit Formulas for Computing Pairings over Ordinary Curves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {48--68}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_5}, doi = {10.1007/978-3-642-20465-4\_5}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AranhaKLGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AsharovCH11, author = {Gilad Asharov and Ran Canetti and Carmit Hazay}, editor = {Kenneth G. Paterson}, title = {Towards a Game Theoretic View of Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {426--445}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_24}, doi = {10.1007/978-3-642-20465-4\_24}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AsharovCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeckerCJ11, author = {Anja Becker and Jean{-}S{\'{e}}bastien Coron and Antoine Joux}, editor = {Kenneth G. Paterson}, title = {Improved Generic Algorithms for Hard Knapsacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {364--385}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_21}, doi = {10.1007/978-3-642-20465-4\_21}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeckerCJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BendlinDOZ11, author = {Rikke Bendlin and Ivan Damg{\aa}rd and Claudio Orlandi and Sarah Zakarias}, editor = {Kenneth G. Paterson}, title = {Semi-homomorphic Encryption and Multiparty Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {169--188}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_11}, doi = {10.1007/978-3-642-20465-4\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BendlinDOZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehF11, author = {Dan Boneh and David Mandell Freeman}, editor = {Kenneth G. Paterson}, title = {Homomorphic Signatures for Polynomial Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {149--168}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_10}, doi = {10.1007/978-3-642-20465-4\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoumanF11, author = {Niek J. Bouman and Serge Fehr}, editor = {Kenneth G. Paterson}, title = {Secure Authentication from a Weak Key, without Leaking Information}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {246--265}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_15}, doi = {10.1007/978-3-642-20465-4\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoumanF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleSW11, author = {Elette Boyle and Gil Segev and Daniel Wichs}, editor = {Kenneth G. Paterson}, title = {Fully Leakage-Resilient Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {89--108}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_7}, doi = {10.1007/978-3-642-20465-4\_7}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoFW11, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Kenneth G. Paterson}, title = {Adaptive Pseudo-free Groups and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {207--223}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_13}, doi = {10.1007/978-3-642-20465-4\_13}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Cramer11, author = {Ronald Cramer}, editor = {Kenneth G. Paterson}, title = {The Arithmetic Codex: Theory and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {1}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_1}, doi = {10.1007/978-3-642-20465-4\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Cramer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisS11, author = {Yevgeniy Dodis and John P. Steinberger}, editor = {Kenneth G. Paterson}, title = {Domain Extension for MACs Beyond the Birthday Barrier}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {323--342}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_19}, doi = {10.1007/978-3-642-20465-4\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DurmuthF11, author = {Markus D{\"{u}}rmuth and David Mandell Freeman}, editor = {Kenneth G. Paterson}, title = {Deniable Encryption with Negligible Detection Probability: An Interactive Construction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {610--626}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_33}, doi = {10.1007/978-3-642-20465-4\_33}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DurmuthF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Fuchsbauer11, author = {Georg Fuchsbauer}, editor = {Kenneth G. Paterson}, title = {Commuting Signatures and Verifiable Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {224--245}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_14}, doi = {10.1007/978-3-642-20465-4\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Fuchsbauer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryH11, author = {Craig Gentry and Shai Halevi}, editor = {Kenneth G. Paterson}, title = {Implementing Gentry's Fully-Homomorphic Encryption Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {129--148}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_9}, doi = {10.1007/978-3-642-20465-4\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKOPS11, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai}, editor = {Kenneth G. Paterson}, title = {Efficient Non-interactive Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {406--425}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_23}, doi = {10.1007/978-3-642-20465-4\_23}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKOPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11, author = {Eike Kiltz and Krzysztof Pietrzak and David Cash and Abhishek Jain and Daniele Venturi}, editor = {Kenneth G. Paterson}, title = {Efficient Authentication from Hard Learning Problems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {7--26}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_3}, doi = {10.1007/978-3-642-20465-4\_3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Leander11, author = {Gregor Leander}, editor = {Kenneth G. Paterson}, title = {On Linear Hulls, Statistical Saturation Attacks, {PRESENT} and a Cryptanalysis of {PUFFIN}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {303--322}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_18}, doi = {10.1007/978-3-642-20465-4\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Leander11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW11, author = {Allison B. Lewko and Brent Waters}, editor = {Kenneth G. Paterson}, title = {Unbounded {HIBE} and Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {547--567}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_30}, doi = {10.1007/978-3-642-20465-4\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW11a, author = {Allison B. Lewko and Brent Waters}, editor = {Kenneth G. Paterson}, title = {Decentralizing Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {568--588}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_31}, doi = {10.1007/978-3-642-20465-4\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Lindell11, author = {Yehuda Lindell}, editor = {Kenneth G. Paterson}, title = {Highly-Efficient Universally-Composable Commitments Based on the {DDH} Assumption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {446--466}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_25}, doi = {10.1007/978-3-642-20465-4\_25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Lindell11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MalkinTY11, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, editor = {Kenneth G. Paterson}, title = {Efficient Circuit-Size Independent Public Key Encryption with {KDM} Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {507--526}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_28}, doi = {10.1007/978-3-642-20465-4\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MalkinTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MoradiPLPW11, author = {Amir Moradi and Axel Poschmann and San Ling and Christof Paar and Huaxiong Wang}, editor = {Kenneth G. Paterson}, title = {Pushing the Limits: {A} Very Compact and a Threshold Implementation of {AES}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {69--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_6}, doi = {10.1007/978-3-642-20465-4\_6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MoradiPLPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Nguyen11, author = {Phong Q. Nguyen}, editor = {Kenneth G. Paterson}, title = {Lattice Reduction Algorithms: Theory and Practice}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {2--6}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_2}, doi = {10.1007/978-3-642-20465-4\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Nguyen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Obana11, author = {Satoshi Obana}, editor = {Kenneth G. Paterson}, title = {Almost Optimum \emph{t}-Cheater Identifiable Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {284--302}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_17}, doi = {10.1007/978-3-642-20465-4\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Obana11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RenauldSVKF11, author = {Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Dina Kamel and Denis Flandre}, editor = {Kenneth G. Paterson}, title = {A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {109--128}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_8}, doi = {10.1007/978-3-642-20465-4\_8}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/RenauldSVKF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RistenpartSS11, author = {Thomas Ristenpart and Hovav Shacham and Thomas Shrimpton}, editor = {Kenneth G. Paterson}, title = {Careful with Composition: Limitations of the Indifferentiability Framework}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {487--506}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_27}, doi = {10.1007/978-3-642-20465-4\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RistenpartSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Schage11, author = {Sven Sch{\"{a}}ge}, editor = {Kenneth G. Paterson}, title = {Tight Proofs for Signature Schemes without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {189--206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_12}, doi = {10.1007/978-3-642-20465-4\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Schage11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SepehrdadVV11, author = {Pouyan Sepehrdad and Serge Vaudenay and Martin Vuagnoux}, editor = {Kenneth G. Paterson}, title = {Statistical Attack on {RC4} - Distinguishing {WPA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {343--363}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_20}, doi = {10.1007/978-3-642-20465-4\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SepehrdadVV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShelatS11, author = {Abhi Shelat and Chih{-}Hao Shen}, editor = {Kenneth G. Paterson}, title = {Two-Output Secure Computation with Malicious Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {386--405}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_22}, doi = {10.1007/978-3-642-20465-4\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShelatS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/StehleS11, author = {Damien Stehl{\'{e}} and Ron Steinfeld}, editor = {Kenneth G. Paterson}, title = {Making {NTRU} as Secure as Worst-Case Problems over Ideal Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {27--47}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_4}, doi = {10.1007/978-3-642-20465-4\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/StehleS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Unruh11, author = {Dominique Unruh}, editor = {Kenneth G. Paterson}, title = {Concurrent Composition in the Bounded Quantum Storage Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {467--486}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_26}, doi = {10.1007/978-3-642-20465-4\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Unruh11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wee11, author = {Hoeteck Wee}, editor = {Kenneth G. Paterson}, title = {Threshold and Revocation Cryptosystems via Extractable Hash Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {589--609}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_32}, doi = {10.1007/978-3-642-20465-4\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wee11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2011, editor = {Kenneth G. Paterson}, title = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4}, doi = {10.1007/978-3-642-20465-4}, isbn = {978-3-642-20464-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.