Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David Cash
@article{DBLP:journals/iacr/NgHCE23, author = {Ruth Ng and Alexander Hoover and David Cash and Eileen Ee}, title = {Structured Encryption for Indirect Addressing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1146}, year = {2023}, url = {https://eprint.iacr.org/2023/1146}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NgHCE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AronestyCDGHKT22, author = {Erik Aronesty and David Cash and Yevgeniy Dodis and Daniel H. Gallancy and Christopher Higley and Harish Karthikeyan and Oren Tysor}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {256--285}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_9}, doi = {10.1007/978-3-030-97131-1\_9}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AronestyCDGHKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AronestyCDGHKT22, author = {Erik Aronesty and David Cash and Yevgeniy Dodis and Daniel H. Gallancy and Christopher Higley and Harish Karthikeyan and Oren Tysor}, title = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2022}, url = {https://eprint.iacr.org/2022/071}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AronestyCDGHKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CashNR21, author = {David Cash and Ruth Ng and Adam Rivkin}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Improved Structured Encryption for {SQL} Databases via Hybrid Indexing}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12727}, pages = {480--510}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78375-4\_19}, doi = {10.1007/978-3-030-78375-4\_19}, timestamp = {Thu, 10 Jun 2021 16:38:04 +0200}, biburl = {https://dblp.org/rec/conf/acns/CashNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XuNCR21, author = {Min Xu and Armin Namavari and David Cash and Thomas Ristenpart}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Searching Encrypted Data with Size-Locked Indexes}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4025--4042}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/xu-min}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/XuNCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashNR21, author = {David Cash and Ruth Ng and Adam Rivkin}, title = {Improved Structured Encryption for {SQL} Databases via Hybrid Indexing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2021}, url = {https://eprint.iacr.org/2021/852}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FalzonMACRST20, author = {Francesca Falzon and Evangelia Anna Markatou and Akshima and David Cash and Adam Rivkin and Jesse Stern and Roberto Tamassia}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Full Database Reconstruction in Two Dimensions}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {443--460}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417275}, doi = {10.1145/3372297.3417275}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FalzonMACRST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AkshimaCDW20, author = {Akshima and David Cash and Andrew Drucker and Hoeteck Wee}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Time-Space Tradeoffs and Short Collisions in Merkle-Damg{\aa}rd Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {157--186}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_6}, doi = {10.1007/978-3-030-56784-2\_6}, timestamp = {Wed, 12 Aug 2020 14:16:56 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AkshimaCDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CashDH20, author = {David Cash and Andrew Drucker and Alexander Hoover}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {A Lower Bound for One-Round Oblivious {RAM}}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {457--485}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_16}, doi = {10.1007/978-3-030-64375-1\_16}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/CashDH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkshimaCFRS20, author = {Akshima and David Cash and Francesca Falzon and Adam Rivkin and Jesse Stern}, title = {Multidimensional Database Reconstruction from Range Query Access Patterns}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2020}, url = {https://eprint.iacr.org/2020/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkshimaCFRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkshimaCDW20, author = {Akshima and David Cash and Andrew Drucker and Hoeteck Wee}, title = {Time-Space Tradeoffs and Short Collisions in Merkle-Damg{\aa}rd Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {770}, year = {2020}, url = {https://eprint.iacr.org/2020/770}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkshimaCDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashDH20, author = {David Cash and Andrew Drucker and Alexander Hoover}, title = {A Lower Bound for One-Round Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1195}, year = {2020}, url = {https://eprint.iacr.org/2020/1195}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CashDH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuNGCU19, author = {Enze Liu and Amanda Nakanishi and Maximilian Golla and David Cash and Blase Ur}, title = {Reasoning Analytically about Password-Cracking Software}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {380--397}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00070}, doi = {10.1109/SP.2019.00070}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiuNGCU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/BindschaedlerGC18, author = {Vincent Bindschaedler and Paul Grubbs and David Cash and Thomas Ristenpart and Vitaly Shmatikov}, title = {The Tao of Inference in Privacy-Protected Databases}, journal = {Proc. {VLDB} Endow.}, volume = {11}, number = {11}, pages = {1715--1728}, year = {2018}, url = {http://www.vldb.org/pvldb/vol11/p1715-bindschaedler.pdf}, doi = {10.14778/3236187.3236217}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/BindschaedlerGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CashLOZZ18, author = {David Cash and Feng{-}Hao Liu and Adam O'Neill and Mark Zhandry and Cong Zhang}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Parameter-Hiding Order Revealing Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11272}, pages = {181--210}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03326-2\_7}, doi = {10.1007/978-3-030-03326-2\_7}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CashLOZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CashZ18, author = {David Cash and Cong Zhang}, editor = {Amos Beimel and Stefan Dziembowski}, title = {A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {159--176}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_6}, doi = {10.1007/978-3-030-03810-6\_6}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CashZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashLOZZ18, author = {David Cash and Feng{-}Hao Liu and Adam O'Neill and Mark Zhandry and Cong Zhang}, title = {Parameter-Hiding Order Revealing Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2018}, url = {https://eprint.iacr.org/2018/698}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashLOZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CashKW17, author = {David Cash and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Daniel Wichs}, title = {Dynamic Proofs of Retrievability Via Oblivious {RAM}}, journal = {J. Cryptol.}, volume = {30}, number = {1}, pages = {22--57}, year = {2017}, url = {https://doi.org/10.1007/s00145-015-9216-2}, doi = {10.1007/S00145-015-9216-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CashKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KiltzPVCJ17, author = {Eike Kiltz and Krzysztof Pietrzak and Daniele Venturi and David Cash and Abhishek Jain}, title = {Efficient Authentication from Hard Learning Problems}, journal = {J. Cryptol.}, volume = {30}, number = {4}, pages = {1238--1275}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9247-3}, doi = {10.1007/S00145-016-9247-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KiltzPVCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AuerbachCFK17, author = {Benedikt Auerbach and David Cash and Manuel Fersch and Eike Kiltz}, editor = {Jonathan Katz and Hovav Shacham}, title = {Memory-Tight Reductions}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {101--132}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_4}, doi = {10.1007/978-3-319-63688-7\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AuerbachCFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangGLBCR17, author = {Liang Wang and Paul Grubbs and Jiahui Lu and Vincent Bindschaedler and David Cash and Thomas Ristenpart}, title = {Side-Channel Attacks on Shared Search Indexes}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {673--692}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.50}, doi = {10.1109/SP.2017.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WangGLBCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuerbachCFK17, author = {Benedikt Auerbach and David Cash and Manuel Fersch and Eike Kiltz}, title = {Memory-Tight Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2017}, url = {http://eprint.iacr.org/2017/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuerbachCFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindschaedlerGC17, author = {Vincent Bindschaedler and Paul Grubbs and David Cash and Thomas Ristenpart and Vitaly Shmatikov}, title = {The Tao of Inference in Privacy-Protected Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1078}, year = {2017}, url = {http://eprint.iacr.org/2017/1078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BindschaedlerGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashZ17, author = {David Cash and Cong Zhang}, title = {A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1120}, year = {2017}, url = {http://eprint.iacr.org/2017/1120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DurakDC16, author = {F. Bet{\"{u}}l Durak and Thomas M. DuBuisson and David Cash}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {What Else is Revealed by Order-Revealing Encryption?}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1155--1166}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978379}, doi = {10.1145/2976749.2978379}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DurakDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/ZhangCWYC16, author = {Cong Zhang and David Cash and Xiuhua Wang and Xiaoqi Yu and Sherman S. M. Chow}, editor = {Thang N. Dinh and My T. Thai}, title = {Combiners for Chosen-Ciphertext Security}, booktitle = {Computing and Combinatorics - 22nd International Conference, {COCOON} 2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9797}, pages = {257--268}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42634-1\_21}, doi = {10.1007/978-3-319-42634-1\_21}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/ZhangCWYC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CashKT16, author = {David Cash and Eike Kiltz and Stefano Tessaro}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Two-Round Man-in-the-Middle Security from {LPN}}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {225--248}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_10}, doi = {10.1007/978-3-662-49096-9\_10}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CashKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiCTW16, author = {Zvika Brakerski and David Cash and Rotem Tsabary and Hoeteck Wee}, editor = {Martin Hirt and Adam D. Smith}, title = {Targeted Homomorphic Attribute-Based Encryption}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {330--360}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_13}, doi = {10.1007/978-3-662-53644-5\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiCTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashLOZ16, author = {David Cash and Feng{-}Hao Liu and Adam O'Neill and Cong Zhang}, title = {Reducing the Leakage in Practical Order-Revealing Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2016}, url = {http://eprint.iacr.org/2016/661}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashLOZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiCTW16, author = {Zvika Brakerski and David Cash and Rotem Tsabary and Hoeteck Wee}, title = {Targeted Homomorphic Attribute Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2016}, url = {http://eprint.iacr.org/2016/691}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiCTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashGPR16, author = {David Cash and Paul Grubbs and Jason Perry and Thomas Ristenpart}, title = {Leakage-Abuse Attacks Against Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2016}, url = {http://eprint.iacr.org/2016/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashGPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurakDC16, author = {F. Bet{\"{u}}l Durak and Thomas DuBuisson and David Cash}, title = {What Else is Revealed by Order-Revealing Encryption?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {786}, year = {2016}, url = {http://eprint.iacr.org/2016/786}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurakDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CashGPR15, author = {David Cash and Paul Grubbs and Jason Perry and Thomas Ristenpart}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Leakage-Abuse Attacks Against Searchable Encryption}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {668--679}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813700}, doi = {10.1145/2810103.2813700}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CashGPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CashDK15, author = {David Cash and Rafael Dowsley and Eike Kiltz}, editor = {Jonathan Katz}, title = {Digital Signatures from Strong {RSA} without Prime Generation}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {217--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_10}, doi = {10.1007/978-3-662-46447-2\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CashDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashKT15, author = {David Cash and Eike Kiltz and Stefano Tessaro}, title = {Two-Round Man-in-the-Middle Security from {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1220}, year = {2015}, url = {http://eprint.iacr.org/2015/1220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CashT14, author = {David Cash and Stefano Tessaro}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {The Locality of Searchable Symmetric Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {351--368}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_20}, doi = {10.1007/978-3-642-55220-5\_20}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CashT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CashJJJKRS14, author = {David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/dynamic-searchable-encryption-very-large-databases-data-structures-and-implementation}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CashJJJKRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashT14, author = {David Cash and Stefano Tessaro}, title = {The Locality of Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2014}, url = {http://eprint.iacr.org/2014/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashJJJKRS14, author = {David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2014}, url = {http://eprint.iacr.org/2014/853}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashJJJKRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CashJJKRS13, author = {David Cash and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, editor = {Ran Canetti and Juan A. Garay}, title = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {353--373}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_20}, doi = {10.1007/978-3-642-40041-4\_20}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CashJJKRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CashKW13, author = {David Cash and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Daniel Wichs}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Dynamic Proofs of Retrievability via Oblivious {RAM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {279--295}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_17}, doi = {10.1007/978-3-642-38348-9\_17}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CashKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashJJKRS13, author = {David Cash and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2013}, url = {http://eprint.iacr.org/2013/169}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashJJKRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CashHKP12, author = {David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert}, title = {Bonsai Trees, or How to Delegate a Lattice Basis}, journal = {J. Cryptol.}, volume = {25}, number = {4}, pages = {601--639}, year = {2012}, url = {https://doi.org/10.1007/s00145-011-9105-2}, doi = {10.1007/S00145-011-9105-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CashHKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CashGH12, author = {David Cash and Matthew Green and Susan Hohenberger}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {New Definitions and Separations for Circular Security}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {540--557}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_32}, doi = {10.1007/978-3-642-30057-8\_32}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CashGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashKW12, author = {David Cash and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Daniel Wichs}, title = {Dynamic Proofs of Retrievability via Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2012}, url = {http://eprint.iacr.org/2012/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BellareCM11, author = {Mihir Bellare and David Cash and Rachel Miller}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Cryptography Secure against Related-Key Attacks and Tampering}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {486--503}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_26}, doi = {10.1007/978-3-642-25385-0\_26}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BellareCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareCK11, author = {Mihir Bellare and David Cash and Sriram Keelveedhi}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Ciphers that securely encipher their own keys}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {423--432}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046757}, doi = {10.1145/2046707.2046757}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellareCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11, author = {Eike Kiltz and Krzysztof Pietrzak and David Cash and Abhishek Jain and Daniele Venturi}, editor = {Kenneth G. Paterson}, title = {Efficient Authentication from Hard Learning Problems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {7--26}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_3}, doi = {10.1007/978-3-642-20465-4\_3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareCM11, author = {Mihir Bellare and David Cash and Rachel Miller}, title = {Cryptography Secure Against Related-Key Attacks and Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2011}, url = {http://eprint.iacr.org/2011/252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareCK11, author = {Mihir Bellare and David Cash and Sriram Keelveedhi}, title = {Ciphers that Securely Encipher their own Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2011}, url = {http://eprint.iacr.org/2011/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareC10, author = {Mihir Bellare and David Cash}, editor = {Tal Rabin}, title = {Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {666--684}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_36}, doi = {10.1007/978-3-642-14623-7\_36}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AcarBBC10, author = {Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash}, editor = {Henri Gilbert}, title = {Cryptographic Agility and Its Relation to Circular Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {403--422}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_21}, doi = {10.1007/978-3-642-13190-5\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AcarBBC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CashHKP10, author = {David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert}, editor = {Henri Gilbert}, title = {Bonsai Trees, or How to Delegate a Lattice Basis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {523--552}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_27}, doi = {10.1007/978-3-642-13190-5\_27}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CashHKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AcarBBC10, author = {Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash}, title = {Cryptographic Agility and its Relation to Circular Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2010}, url = {http://eprint.iacr.org/2010/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AcarBBC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareC10, author = {Mihir Bellare and David Cash}, title = {Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2010}, url = {http://eprint.iacr.org/2010/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashHKP10, author = {David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert}, title = {Bonsai Trees, or How to Delegate a Lattice Basis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2010}, url = {http://eprint.iacr.org/2010/591}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashHKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CashKS09, author = {David Cash and Eike Kiltz and Victor Shoup}, title = {The Twin Diffie-Hellman Problem and Applications}, journal = {J. Cryptol.}, volume = {22}, number = {4}, pages = {470--504}, year = {2009}, url = {https://doi.org/10.1007/s00145-009-9041-6}, doi = {10.1007/S00145-009-9041-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CashKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoldyrevaCFW09, author = {Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi}, editor = {Mitsuru Matsui}, title = {Foundations of Non-malleable Hash and One-Way Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {524--541}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_31}, doi = {10.1007/978-3-642-10366-7\_31}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoldyrevaCFW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumCPS09, author = {Benny Applebaum and David Cash and Chris Peikert and Amit Sahai}, editor = {Shai Halevi}, title = {Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {595--618}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_35}, doi = {10.1007/978-3-642-03356-8\_35}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumCPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaCFW09, author = {Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi}, title = {Foundations of Non-Malleable Hash and One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2009}, url = {http://eprint.iacr.org/2009/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaCFW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashHK09, author = {David Cash and Dennis Hofheinz and Eike Kiltz}, title = {How to Delegate a Lattice Basis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2009}, url = {http://eprint.iacr.org/2009/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/BauerBC08, author = {David Bauer and Douglas M. Blough and David Cash}, editor = {Elisa Bertino and Kenji Takahashi}, title = {Minimal information disclosure with efficiently verifiable credentials}, booktitle = {Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008}, pages = {15--24}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456424.1456428}, doi = {10.1145/1456424.1456428}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dim/BauerBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CashKS08, author = {David Cash and Eike Kiltz and Victor Shoup}, editor = {Nigel P. Smart}, title = {The Twin Diffie-Hellman Problem and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {127--145}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_8}, doi = {10.1007/978-3-540-78967-3\_8}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CashKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashKS08, author = {David Cash and Eike Kiltz and Victor Shoup}, title = {The Twin Diffie-Hellman Problem and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2008}, url = {http://eprint.iacr.org/2008/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CashDDLLW07, author = {David Cash and Yan Zong Ding and Yevgeniy Dodis and Wenke Lee and Richard J. Lipton and Shabsi Walfish}, editor = {Salil P. Vadhan}, title = {Intrusion-Resilient Key Exchange in the Bounded Retrieval Model}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {479--498}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_26}, doi = {10.1007/978-3-540-70936-7\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CashDDLLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.