BibTeX records: Scott R. Fluhrer
@inproceedings{DBLP:conf/pqcrypto/BaanBFGLRSTZ19, author = {Hayo Baan and Sauvik Bhattacharya and Scott R. Fluhrer and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Thijs Laarhoven and Ronald Rietman and Markku{-}Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang}, title = {Round5: Compact and Fast Post-quantum Public-Key Encryption}, booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers}, pages = {83--102}, year = {2019}, crossref = {DBLP:conf/pqcrypto/2019}, url = {https://doi.org/10.1007/978-3-030-25510-7\_5}, doi = {10.1007/978-3-030-25510-7\_5}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/conf/pqcrypto/BaanBFGLRSTZ19}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaanBFGLRSTZ19, author = {Hayo Baan and Sauvik Bhattacharya and Scott R. Fluhrer and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Thijs Laarhoven and Ronald Rietman and Markku{-}Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang}, title = {Round5: Compact and Fast Post-Quantum Public-Key Encryption}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2019}, pages = {90}, year = {2019}, url = {https://eprint.iacr.org/2019/090}, timestamp = {Tue, 12 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/bib/journals/iacr/BaanBFGLRSTZ19}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8554, author = {David A. McGrew and Michael Curcio and Scott R. Fluhrer}, title = {Leighton-Micali Hash-Based Signatures}, journal = {{RFC}}, volume = {8554}, pages = {1--61}, year = {2019}, url = {https://doi.org/10.17487/RFC8554}, doi = {10.17487/RFC8554}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/rfc/rfc8554}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DingFR18, author = {Jintai Ding and Scott R. Fluhrer and Saraswathy RV}, title = {Complete Attack on {RLWE} Key Exchange with Reused Keys, Without Signal Leakage}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, pages = {467--486}, year = {2018}, crossref = {DBLP:conf/acisp/2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_27}, doi = {10.1007/978-3-319-93638-3\_27}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/bib/conf/acisp/DingFR18}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/DingASFL17, author = {Jintai Ding and Saed Alsayigh and R. V. Saraswathy and Scott R. Fluhrer and Xiaodong Lin}, title = {Leakage of signal function with reused keys in {RLWE} key exchange}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, year = {2017}, crossref = {DBLP:conf/icc/2017}, url = {https://doi.org/10.1109/ICC.2017.7996806}, doi = {10.1109/ICC.2017.7996806}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/bib/conf/icc/DingASFL17}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KampanakisF17, author = {Panos Kampanakis and Scott R. Fluhrer}, title = {{LMS} vs {XMSS:} {A} comparison of the Stateful Hash-Based Signature Proposed Standards}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2017}, pages = {349}, year = {2017}, url = {http://eprint.iacr.org/2017/349}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/KampanakisF17}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer17, author = {Scott R. Fluhrer}, title = {Further Analysis of a Proposed Hash-Based Signature Standard}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2017}, pages = {553}, year = {2017}, url = {http://eprint.iacr.org/2017/553}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/Fluhrer17}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer17a, author = {Scott R. Fluhrer}, title = {Reassessing Grover's Algorithm}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2017}, pages = {811}, year = {2017}, url = {http://eprint.iacr.org/2017/811}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/Fluhrer17a}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingFR17, author = {Jintai Ding and Scott R. Fluhrer and Saraswathy RV}, title = {Complete Attack on {RLWE} Key Exchange with reused keys, without Signal Leakage}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2017}, pages = {1185}, year = {2017}, url = {http://eprint.iacr.org/2017/1185}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/DingFR17}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/McGrewKFGBB16, author = {David A. McGrew and Panos Kampanakis and Scott R. Fluhrer and Stefan{-}Lukas Gazdag and Denis Butin and Johannes A. Buchmann}, title = {State Management for Hash-Based Signatures}, booktitle = {Security Standardisation Research - Third International Conference, {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings}, pages = {244--260}, year = {2016}, crossref = {DBLP:conf/secsr/2016}, url = {https://doi.org/10.1007/978-3-319-49100-4\_11}, doi = {10.1007/978-3-319-49100-4\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/conf/secsr/McGrewKFGBB16}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer16, author = {Scott R. Fluhrer}, title = {Cryptanalysis of ring-LWE based key exchange with key share reuse}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2016}, pages = {85}, year = {2016}, url = {http://eprint.iacr.org/2016/085}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/Fluhrer16}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McGrewKFGBB16, author = {David A. McGrew and Panos Kampanakis and Scott R. Fluhrer and Stefan{-}Lukas Gazdag and Denis Butin and Johannes A. Buchmann}, title = {State Management for Hash Based Signatures}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2016}, pages = {357}, year = {2016}, url = {http://eprint.iacr.org/2016/357}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/McGrewKFGBB16}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingARF16, author = {Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott R. Fluhrer}, title = {Leakage of Signal function with reused keys in {RLWE} key exchange}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2016}, pages = {1176}, year = {2016}, url = {http://eprint.iacr.org/2016/1176}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/DingARF16}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer15, author = {Scott R. Fluhrer}, title = {Quantum Cryptanalysis of {NTRU}}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2015}, pages = {676}, year = {2015}, url = {http://eprint.iacr.org/2015/676}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/Fluhrer15}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer15a, author = {Scott R. Fluhrer}, title = {Scalar Blinding on Elliptic Curves based on Primes with Special Structure}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2015}, pages = {801}, year = {2015}, url = {http://eprint.iacr.org/2015/801}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/Fluhrer15a}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AbedFFLLMW14, author = {Farzaneh Abed and Scott R. Fluhrer and Christian Forler and Eik List and Stefan Lucks and David A. McGrew and Jakob Wenzel}, title = {Pipelineable On-line Encryption}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, pages = {205--223}, year = {2014}, crossref = {DBLP:conf/fse/2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_11}, doi = {10.1007/978-3-662-46706-0\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/conf/fse/AbedFFLLMW14}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/DaraF14, author = {Sashank Dara and Scott R. Fluhrer}, title = {{FNR:} Arbitrary Length Small Domain Block Cipher Proposal}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, pages = {146--154}, year = {2014}, crossref = {DBLP:conf/space/2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_10}, doi = {10.1007/978-3-319-12060-7\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/bib/conf/space/DaraF14}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbedFFLLMW14, author = {Farzaneh Abed and Scott R. Fluhrer and Christian Forler and Eik List and Stefan Lucks and David A. McGrew and Jakob Wenzel}, title = {Pipelineable On-Line Encryption}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2014}, pages = {297}, year = {2014}, url = {http://eprint.iacr.org/2014/297}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/AbedFFLLMW14}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaraF14, author = {Sashank Dara and Scott R. Fluhrer}, title = {{FNR} : Arbitrary length small domain block cipher proposal}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2014}, pages = {421}, year = {2014}, url = {http://eprint.iacr.org/2014/421}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/DaraF14}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6989, author = {Yaron Sheffer and Scott R. Fluhrer}, title = {Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2)}, journal = {{RFC}}, volume = {6989}, pages = {1--10}, year = {2013}, url = {https://doi.org/10.17487/RFC6989}, doi = {10.17487/RFC6989}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/rfc/rfc6989}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6124, author = {Yaron Sheffer and Glen Zorn and Hannes Tschofenig and Scott R. Fluhrer}, title = {An {EAP} Authentication Method Based on the Encrypted Key Exchange {(EKE)} Protocol}, journal = {{RFC}}, volume = {6124}, pages = {1--33}, year = {2011}, url = {https://doi.org/10.17487/RFC6124}, doi = {10.17487/RFC6124}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/rfc/rfc6124}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer08, author = {Scott R. Fluhrer}, title = {Collision Attack on the Waterfall Hash Function}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2008}, pages = {531}, year = {2008}, url = {http://eprint.iacr.org/2008/531}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/Fluhrer08}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/McGrewF07, author = {David A. McGrew and Scott R. Fluhrer}, title = {The Security of the Extended Codebook {(XCB)} Mode of Operation}, booktitle = {Selected Areas in Cryptography, 14th International Workshop, {SAC} 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers}, pages = {311--327}, year = {2007}, crossref = {DBLP:conf/sacrypt/2007}, url = {https://doi.org/10.1007/978-3-540-77360-3\_20}, doi = {10.1007/978-3-540-77360-3\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/bib/conf/sacrypt/McGrewF07}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McGrewF07, author = {David A. McGrew and Scott R. Fluhrer}, title = {The Security of the Extended Codebook {(XCB)} Mode of Operation}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2007}, pages = {298}, year = {2007}, url = {http://eprint.iacr.org/2007/298}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/McGrewF07}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McGrewF05, author = {David A. McGrew and Scott R. Fluhrer}, title = {Multiple forgery attacks against Message Authentication Codes}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2005}, pages = {161}, year = {2005}, url = {http://eprint.iacr.org/2005/161}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/McGrewF05}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McGrewF04, author = {David A. McGrew and Scott R. Fluhrer}, title = {The Extended Codebook {(XCB)} Mode of Operation}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2004}, pages = {278}, year = {2004}, url = {http://eprint.iacr.org/2004/278}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/McGrewF04}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer02, author = {Scott R. Fluhrer}, title = {Improved key recovery of level 1 of the Bluetooth Encryption System}, journal = {{IACR} Cryptology ePrint Archive}, volume = {2002}, pages = {68}, year = {2002}, url = {http://eprint.iacr.org/2002/068}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/iacr/Fluhrer02}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Fluhrer01, author = {Scott R. Fluhrer}, title = {Cryptanalysis of the Mercy Block Cipher}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, pages = {28--36}, year = {2001}, crossref = {DBLP:conf/fse/2001}, url = {https://doi.org/10.1007/3-540-45473-X\_3}, doi = {10.1007/3-540-45473-X\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/bib/conf/fse/Fluhrer01}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Fluhrer01a, author = {Scott R. Fluhrer}, title = {Cryptanalysis of the {SEAL} 3.0 Pseudorandom Function Family}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, pages = {135--143}, year = {2001}, crossref = {DBLP:conf/fse/2001}, url = {https://doi.org/10.1007/3-540-45473-X\_11}, doi = {10.1007/3-540-45473-X\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/bib/conf/fse/Fluhrer01a}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FluhrerMS01, author = {Scott R. Fluhrer and Itsik Mantin and Adi Shamir}, title = {Weaknesses in the Key Scheduling Algorithm of {RC4}}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, pages = {1--24}, year = {2001}, crossref = {DBLP:conf/sacrypt/2001}, url = {https://doi.org/10.1007/3-540-45537-X\_1}, doi = {10.1007/3-540-45537-X\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/bib/conf/sacrypt/FluhrerMS01}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FluhrerL01, author = {Scott R. Fluhrer and Stefan Lucks}, title = {Analysis of the E\({}_{\mbox{0}}\) Encryption System}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, pages = {38--48}, year = {2001}, crossref = {DBLP:conf/sacrypt/2001}, url = {https://doi.org/10.1007/3-540-45537-X\_3}, doi = {10.1007/3-540-45537-X\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/bib/conf/sacrypt/FluhrerL01}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FluhrerM00, author = {Scott R. Fluhrer and David A. McGrew}, title = {Statistical Analysis of the Alleged {RC4} Keystream Generator}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, pages = {19--30}, year = {2000}, crossref = {DBLP:conf/fse/2000}, url = {https://doi.org/10.1007/3-540-44706-7\_2}, doi = {10.1007/3-540-44706-7\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/bib/conf/fse/FluhrerM00}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/McGrewF00, author = {David A. McGrew and Scott R. Fluhrer}, title = {Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security}, booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop, {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}, pages = {14--28}, year = {2000}, crossref = {DBLP:conf/sacrypt/2000}, url = {https://doi.org/10.1007/3-540-44983-3\_2}, doi = {10.1007/3-540-44983-3\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/bib/conf/sacrypt/McGrewF00}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pqcrypto/2019, editor = {Jintai Ding and Rainer Steinwandt}, title = {Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11505}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25510-7}, doi = {10.1007/978-3-030-25510-7}, isbn = {978-3-030-25509-1}, timestamp = {Mon, 15 Jul 2019 14:30:19 +0200}, biburl = {https://dblp.org/rec/bib/conf/pqcrypto/2019}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2018, editor = {Willy Susilo and Guomin Yang}, title = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3}, doi = {10.1007/978-3-319-93638-3}, isbn = {978-3-319-93637-6}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/bib/conf/acisp/2018}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icc/2017, title = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/7985734/proceeding}, isbn = {978-1-4673-8999-0}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/bib/conf/icc/2017}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secsr/2016, editor = {Lidong Chen and David A. McGrew and Chris J. Mitchell}, title = {Security Standardisation Research - Third International Conference, {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10074}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49100-4}, doi = {10.1007/978-3-319-49100-4}, isbn = {978-3-319-49099-1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/bib/conf/secsr/2016}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2014, editor = {Carlos Cid and Christian Rechberger}, title = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46706-0}, doi = {10.1007/978-3-662-46706-0}, isbn = {978-3-662-46705-3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/bib/conf/fse/2014}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/space/2014, editor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont}, title = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7}, doi = {10.1007/978-3-319-12060-7}, isbn = {978-3-319-12059-1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/bib/conf/space/2014}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2007, editor = {Carlisle M. Adams and Ali Miri and Michael J. Wiener}, title = {Selected Areas in Cryptography, 14th International Workshop, {SAC} 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4876}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77360-3}, doi = {10.1007/978-3-540-77360-3}, isbn = {978-3-540-77359-7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/bib/conf/sacrypt/2007}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2001, editor = {Mitsuru Matsui}, title = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45473-X}, doi = {10.1007/3-540-45473-X}, isbn = {3-540-43869-6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/bib/conf/fse/2001}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2001, editor = {Serge Vaudenay and Amr M. Youssef}, title = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X}, doi = {10.1007/3-540-45537-X}, isbn = {3-540-43066-0}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/bib/conf/sacrypt/2001}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2000, editor = {Bruce Schneier}, title = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44706-7}, doi = {10.1007/3-540-44706-7}, isbn = {3-540-41728-1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/bib/conf/fse/2000}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2000, editor = {Douglas R. Stinson and Stafford E. Tavares}, title = {Selected Areas in Cryptography, 7th Annual International Workshop, {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2012}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44983-3}, doi = {10.1007/3-540-44983-3}, isbn = {3-540-42069-X}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/bib/conf/sacrypt/2000}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.