BibTeX records: Scott R. Fluhrer

download as .bib file

@inproceedings{DBLP:conf/pqcrypto/BaanBFGLRSTZ19,
  author    = {Hayo Baan and
               Sauvik Bhattacharya and
               Scott R. Fluhrer and
               {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
               Thijs Laarhoven and
               Ronald Rietman and
               Markku{-}Juhani O. Saarinen and
               Ludo Tolhuizen and
               Zhenfei Zhang},
  title     = {Round5: Compact and Fast Post-quantum Public-Key Encryption},
  booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
               2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  pages     = {83--102},
  year      = {2019},
  crossref  = {DBLP:conf/pqcrypto/2019},
  url       = {https://doi.org/10.1007/978-3-030-25510-7\_5},
  doi       = {10.1007/978-3-030-25510-7\_5},
  timestamp = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/BaanBFGLRSTZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaanBFGLRSTZ19,
  author    = {Hayo Baan and
               Sauvik Bhattacharya and
               Scott R. Fluhrer and
               {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
               Thijs Laarhoven and
               Ronald Rietman and
               Markku{-}Juhani O. Saarinen and
               Ludo Tolhuizen and
               Zhenfei Zhang},
  title     = {Round5: Compact and Fast Post-Quantum Public-Key Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {90},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/090},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaanBFGLRSTZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8554,
  author    = {David A. McGrew and
               Michael Curcio and
               Scott R. Fluhrer},
  title     = {Leighton-Micali Hash-Based Signatures},
  journal   = {{RFC}},
  volume    = {8554},
  pages     = {1--61},
  year      = {2019},
  url       = {https://doi.org/10.17487/RFC8554},
  doi       = {10.17487/RFC8554},
  timestamp = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc8554},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DingFR18,
  author    = {Jintai Ding and
               Scott R. Fluhrer and
               Saraswathy RV},
  title     = {Complete Attack on {RLWE} Key Exchange with Reused Keys, Without Signal
               Leakage},
  booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
               2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  pages     = {467--486},
  year      = {2018},
  crossref  = {DBLP:conf/acisp/2018},
  url       = {https://doi.org/10.1007/978-3-319-93638-3\_27},
  doi       = {10.1007/978-3-319-93638-3\_27},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/DingFR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/DingASFL17,
  author    = {Jintai Ding and
               Saed Alsayigh and
               R. V. Saraswathy and
               Scott R. Fluhrer and
               Xiaodong Lin},
  title     = {Leakage of signal function with reused keys in {RLWE} key exchange},
  booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
               France, May 21-25, 2017},
  pages     = {1--6},
  year      = {2017},
  crossref  = {DBLP:conf/icc/2017},
  url       = {https://doi.org/10.1109/ICC.2017.7996806},
  doi       = {10.1109/ICC.2017.7996806},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/DingASFL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KampanakisF17,
  author    = {Panos Kampanakis and
               Scott R. Fluhrer},
  title     = {{LMS} vs {XMSS:} {A} comparison of the Stateful Hash-Based Signature
               Proposed Standards},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {349},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/349},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KampanakisF17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer17,
  author    = {Scott R. Fluhrer},
  title     = {Further Analysis of a Proposed Hash-Based Signature Standard},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {553},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/553},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Fluhrer17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer17a,
  author    = {Scott R. Fluhrer},
  title     = {Reassessing Grover's Algorithm},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {811},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/811},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Fluhrer17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingFR17,
  author    = {Jintai Ding and
               Scott R. Fluhrer and
               Saraswathy RV},
  title     = {Complete Attack on {RLWE} Key Exchange with reused keys, without Signal
               Leakage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1185},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1185},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DingFR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/McGrewKFGBB16,
  author    = {David A. McGrew and
               Panos Kampanakis and
               Scott R. Fluhrer and
               Stefan{-}Lukas Gazdag and
               Denis Butin and
               Johannes A. Buchmann},
  title     = {State Management for Hash-Based Signatures},
  booktitle = {Security Standardisation Research - Third International Conference,
               {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  pages     = {244--260},
  year      = {2016},
  crossref  = {DBLP:conf/secsr/2016},
  url       = {https://doi.org/10.1007/978-3-319-49100-4\_11},
  doi       = {10.1007/978-3-319-49100-4\_11},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secsr/McGrewKFGBB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer16,
  author    = {Scott R. Fluhrer},
  title     = {Cryptanalysis of ring-LWE based key exchange with key share reuse},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {85},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/085},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Fluhrer16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McGrewKFGBB16,
  author    = {David A. McGrew and
               Panos Kampanakis and
               Scott R. Fluhrer and
               Stefan{-}Lukas Gazdag and
               Denis Butin and
               Johannes A. Buchmann},
  title     = {State Management for Hash Based Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {357},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/357},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/McGrewKFGBB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingARF16,
  author    = {Jintai Ding and
               Saed Alsayigh and
               Saraswathy RV and
               Scott R. Fluhrer},
  title     = {Leakage of Signal function with reused keys in {RLWE} key exchange},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1176},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1176},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DingARF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer15,
  author    = {Scott R. Fluhrer},
  title     = {Quantum Cryptanalysis of {NTRU}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {676},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/676},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Fluhrer15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer15a,
  author    = {Scott R. Fluhrer},
  title     = {Scalar Blinding on Elliptic Curves based on Primes with Special Structure},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {801},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/801},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Fluhrer15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AbedFFLLMW14,
  author    = {Farzaneh Abed and
               Scott R. Fluhrer and
               Christian Forler and
               Eik List and
               Stefan Lucks and
               David A. McGrew and
               Jakob Wenzel},
  title     = {Pipelineable On-line Encryption},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  pages     = {205--223},
  year      = {2014},
  crossref  = {DBLP:conf/fse/2014},
  url       = {https://doi.org/10.1007/978-3-662-46706-0\_11},
  doi       = {10.1007/978-3-662-46706-0\_11},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/AbedFFLLMW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/DaraF14,
  author    = {Sashank Dara and
               Scott R. Fluhrer},
  title     = {{FNR:} Arbitrary Length Small Domain Block Cipher Proposal},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International
               Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  pages     = {146--154},
  year      = {2014},
  crossref  = {DBLP:conf/space/2014},
  url       = {https://doi.org/10.1007/978-3-319-12060-7\_10},
  doi       = {10.1007/978-3-319-12060-7\_10},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/space/DaraF14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbedFFLLMW14,
  author    = {Farzaneh Abed and
               Scott R. Fluhrer and
               Christian Forler and
               Eik List and
               Stefan Lucks and
               David A. McGrew and
               Jakob Wenzel},
  title     = {Pipelineable On-Line Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {297},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/297},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AbedFFLLMW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaraF14,
  author    = {Sashank Dara and
               Scott R. Fluhrer},
  title     = {{FNR} : Arbitrary length small domain block cipher proposal},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {421},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/421},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DaraF14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6989,
  author    = {Yaron Sheffer and
               Scott R. Fluhrer},
  title     = {Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol
               Version 2 (IKEv2)},
  journal   = {{RFC}},
  volume    = {6989},
  pages     = {1--10},
  year      = {2013},
  url       = {https://doi.org/10.17487/RFC6989},
  doi       = {10.17487/RFC6989},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc6989},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6124,
  author    = {Yaron Sheffer and
               Glen Zorn and
               Hannes Tschofenig and
               Scott R. Fluhrer},
  title     = {An {EAP} Authentication Method Based on the Encrypted Key Exchange
               {(EKE)} Protocol},
  journal   = {{RFC}},
  volume    = {6124},
  pages     = {1--33},
  year      = {2011},
  url       = {https://doi.org/10.17487/RFC6124},
  doi       = {10.17487/RFC6124},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/rfc/rfc6124},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer08,
  author    = {Scott R. Fluhrer},
  title     = {Collision Attack on the Waterfall Hash Function},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {531},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/531},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Fluhrer08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/McGrewF07,
  author    = {David A. McGrew and
               Scott R. Fluhrer},
  title     = {The Security of the Extended Codebook {(XCB)} Mode of Operation},
  booktitle = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
               2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  pages     = {311--327},
  year      = {2007},
  crossref  = {DBLP:conf/sacrypt/2007},
  url       = {https://doi.org/10.1007/978-3-540-77360-3\_20},
  doi       = {10.1007/978-3-540-77360-3\_20},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/McGrewF07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McGrewF07,
  author    = {David A. McGrew and
               Scott R. Fluhrer},
  title     = {The Security of the Extended Codebook {(XCB)} Mode of Operation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {298},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/298},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/McGrewF07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McGrewF05,
  author    = {David A. McGrew and
               Scott R. Fluhrer},
  title     = {Multiple forgery attacks against Message Authentication Codes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {161},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/161},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/McGrewF05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McGrewF04,
  author    = {David A. McGrew and
               Scott R. Fluhrer},
  title     = {The Extended Codebook {(XCB)} Mode of Operation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {278},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/278},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/McGrewF04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer02,
  author    = {Scott R. Fluhrer},
  title     = {Improved key recovery of level 1 of the Bluetooth Encryption System},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {68},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/068},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Fluhrer02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Fluhrer01,
  author    = {Scott R. Fluhrer},
  title     = {Cryptanalysis of the Mercy Block Cipher},
  booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
               Japan, April 2-4, 2001, Revised Papers},
  pages     = {28--36},
  year      = {2001},
  crossref  = {DBLP:conf/fse/2001},
  url       = {https://doi.org/10.1007/3-540-45473-X\_3},
  doi       = {10.1007/3-540-45473-X\_3},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/Fluhrer01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Fluhrer01a,
  author    = {Scott R. Fluhrer},
  title     = {Cryptanalysis of the {SEAL} 3.0 Pseudorandom Function Family},
  booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
               Japan, April 2-4, 2001, Revised Papers},
  pages     = {135--143},
  year      = {2001},
  crossref  = {DBLP:conf/fse/2001},
  url       = {https://doi.org/10.1007/3-540-45473-X\_11},
  doi       = {10.1007/3-540-45473-X\_11},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/Fluhrer01a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FluhrerMS01,
  author    = {Scott R. Fluhrer and
               Itsik Mantin and
               Adi Shamir},
  title     = {Weaknesses in the Key Scheduling Algorithm of {RC4}},
  booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop,
               {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  pages     = {1--24},
  year      = {2001},
  crossref  = {DBLP:conf/sacrypt/2001},
  url       = {https://doi.org/10.1007/3-540-45537-X\_1},
  doi       = {10.1007/3-540-45537-X\_1},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/FluhrerMS01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FluhrerL01,
  author    = {Scott R. Fluhrer and
               Stefan Lucks},
  title     = {Analysis of the E\({}_{\mbox{0}}\) Encryption System},
  booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop,
               {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  pages     = {38--48},
  year      = {2001},
  crossref  = {DBLP:conf/sacrypt/2001},
  url       = {https://doi.org/10.1007/3-540-45537-X\_3},
  doi       = {10.1007/3-540-45537-X\_3},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/FluhrerL01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FluhrerM00,
  author    = {Scott R. Fluhrer and
               David A. McGrew},
  title     = {Statistical Analysis of the Alleged {RC4} Keystream Generator},
  booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
               New York, NY, USA, April 10-12, 2000, Proceedings},
  pages     = {19--30},
  year      = {2000},
  crossref  = {DBLP:conf/fse/2000},
  url       = {https://doi.org/10.1007/3-540-44706-7\_2},
  doi       = {10.1007/3-540-44706-7\_2},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/FluhrerM00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/McGrewF00,
  author    = {David A. McGrew and
               Scott R. Fluhrer},
  title     = {Attacks on Additive Encryption of Redundant Plaintext and Implications
               on Internet Security},
  booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop,
               {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings},
  pages     = {14--28},
  year      = {2000},
  crossref  = {DBLP:conf/sacrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44983-3\_2},
  doi       = {10.1007/3-540-44983-3\_2},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/McGrewF00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2019,
  editor    = {Jintai Ding and
               Rainer Steinwandt},
  title     = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
               2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11505},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-25510-7},
  doi       = {10.1007/978-3-030-25510-7},
  isbn      = {978-3-030-25509-1},
  timestamp = {Mon, 15 Jul 2019 14:30:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2018,
  editor    = {Willy Susilo and
               Guomin Yang},
  title     = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
               2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10946},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93638-3},
  doi       = {10.1007/978-3-319-93638-3},
  isbn      = {978-3-319-93637-6},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2017,
  title     = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
               France, May 21-25, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7985734/proceeding},
  isbn      = {978-1-4673-8999-0},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2016,
  editor    = {Lidong Chen and
               David A. McGrew and
               Chris J. Mitchell},
  title     = {Security Standardisation Research - Third International Conference,
               {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10074},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49100-4},
  doi       = {10.1007/978-3-319-49100-4},
  isbn      = {978-3-319-49099-1},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secsr/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2014,
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46706-0},
  doi       = {10.1007/978-3-662-46706-0},
  isbn      = {978-3-662-46705-3},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/space/2014,
  editor    = {Rajat Subhra Chakraborty and
               Vashek Matyas and
               Patrick Schaumont},
  title     = {Security, Privacy, and Applied Cryptography Engineering - 4th International
               Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8804},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12060-7},
  doi       = {10.1007/978-3-319-12060-7},
  isbn      = {978-3-319-12059-1},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/space/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2007,
  editor    = {Carlisle M. Adams and
               Ali Miri and
               Michael J. Wiener},
  title     = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
               2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4876},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77360-3},
  doi       = {10.1007/978-3-540-77360-3},
  isbn      = {978-3-540-77359-7},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2001,
  editor    = {Mitsuru Matsui},
  title     = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
               Japan, April 2-4, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2355},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45473-X},
  doi       = {10.1007/3-540-45473-X},
  isbn      = {3-540-43869-6},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2001,
  editor    = {Serge Vaudenay and
               Amr M. Youssef},
  title     = {Selected Areas in Cryptography, 8th Annual International Workshop,
               {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2259},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45537-X},
  doi       = {10.1007/3-540-45537-X},
  isbn      = {3-540-43066-0},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2000,
  editor    = {Bruce Schneier},
  title     = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
               New York, NY, USA, April 10-12, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1978},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44706-7},
  doi       = {10.1007/3-540-44706-7},
  isbn      = {3-540-41728-1},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2000,
  editor    = {Douglas R. Stinson and
               Stafford E. Tavares},
  title     = {Selected Areas in Cryptography, 7th Annual International Workshop,
               {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2012},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44983-3},
  doi       = {10.1007/3-540-44983-3},
  isbn      = {3-540-42069-X},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics