BibTeX records: Marc Stevens

download as .bib file

@article{DBLP:journals/tosc/CanteautLNRSS17,
  author    = {Anne Canteaut and
               Eran Lambooij and
               Samuel Neves and
               Shahram Rasoolzadeh and
               Yu Sasaki and
               Marc Stevens},
  title     = {Refined Probability of Differential Characteristics Including Dependency
               Between Multiple Rounds},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {2},
  pages     = {203--227},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i2.203-227},
  doi       = {10.13154/tosc.v2017.i2.203-227},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/CanteautLNRSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StevensBKAM17,
  author    = {Marc Stevens and
               Elie Bursztein and
               Pierre Karpman and
               Ange Albertini and
               Yarik Markov},
  title     = {The First Collision for Full {SHA-1}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {I}},
  pages     = {570--596},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-63688-7\_19},
  doi       = {10.1007/978-3-319-63688-7\_19},
  timestamp = {Mon, 14 Aug 2017 14:32:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/StevensBKAM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/MakarimS17,
  author    = {Rusydi H. Makarim and
               Marc Stevens},
  title     = {{M4GB:} An Efficient Gr{\"{o}}bner-Basis Algorithm},
  booktitle = {Proceedings of the 2017 {ACM} on International Symposium on Symbolic
               and Algebraic Computation, {ISSAC} 2017, Kaiserslautern, Germany,
               July 25-28, 2017},
  pages     = {293--300},
  year      = {2017},
  crossref  = {DBLP:conf/issac/2017},
  url       = {https://doi.org/10.1145/3087604.3087638},
  doi       = {10.1145/3087604.3087638},
  timestamp = {Tue, 06 Nov 2018 16:57:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/issac/MakarimS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StevensS17,
  author    = {Marc Stevens and
               Daniel Shumow},
  title     = {Speeding up detection of {SHA-1} collision attacks using unavoidable
               attack conditions},
  booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017.},
  pages     = {881--897},
  year      = {2017},
  crossref  = {DBLP:conf/uss/2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/stevens},
  timestamp = {Fri, 01 Sep 2017 12:24:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/StevensS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StevensS17,
  author    = {Marc Stevens and
               Daniel Shumow},
  title     = {Speeding up detection of {SHA-1} collision attacks using unavoidable
               attack conditions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {173},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/173},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/StevensS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StevensBKAM17,
  author    = {Marc Stevens and
               Elie Bursztein and
               Pierre Karpman and
               Ange Albertini and
               Yarik Markov},
  title     = {The first collision for full {SHA-1}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {190},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/190},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/StevensBKAM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautLNRSS17,
  author    = {Anne Canteaut and
               Eran Lambooij and
               Samuel Neves and
               Shahram Rasoolzadeh and
               Yu Sasaki and
               Marc Stevens},
  title     = {Refined Probability of Differential Characteristics Including Dependency
               Between Multiple Rounds},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {478},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/478},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CanteautLNRSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/StevensKP16,
  author    = {Marc Stevens and
               Pierre Karpman and
               Thomas Peyrin},
  title     = {Freestart Collision for Full {SHA-1}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  pages     = {459--483},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-49890-3\_18},
  doi       = {10.1007/978-3-662-49890-3\_18},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/StevensKP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BarhamDLS16,
  author    = {Muhammad Barham and
               Orr Dunkelman and
               Stefan Lucks and
               Marc Stevens},
  title     = {New Second Preimage Attacks on Dithered Hash Functions with Low Memory
               Complexity},
  booktitle = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
               St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  pages     = {247--263},
  year      = {2016},
  crossref  = {DBLP:conf/sacrypt/2016},
  url       = {https://doi.org/10.1007/978-3-319-69453-5\_14},
  doi       = {10.1007/978-3-319-69453-5\_14},
  timestamp = {Sat, 24 Nov 2018 11:59:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/BarhamDLS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/Stevens16,
  author    = {Marc Stevens},
  title     = {Deprecating an Internet Security Standard with Cryptanalysis},
  journal   = {{ERCIM} News},
  volume    = {2016},
  number    = {106},
  year      = {2016},
  url       = {http://ercim-news.ercim.eu/en106/special/deprecating-an-internet-security-standard-with-cryptanalysis},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ercim/Stevens16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FillingerS16,
  author    = {Max Fillinger and
               Marc Stevens},
  title     = {Reverse-Engineering of the Cryptanalytic Attack Used in the Flame
               Super-Malware},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {298},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/298},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FillingerS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FillingerS15,
  author    = {Max Fillinger and
               Marc Stevens},
  title     = {Reverse-Engineering of the Cryptanalytic Attack Used in the Flame
               Super-Malware},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  pages     = {586--611},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48800-3\_24},
  doi       = {10.1007/978-3-662-48800-3\_24},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/FillingerS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KarpmanPS15,
  author    = {Pierre Karpman and
               Thomas Peyrin and
               Marc Stevens},
  title     = {Practical Free-Start Collision Attacks on 76-step {SHA-1}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  pages     = {623--642},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47989-6\_30},
  doi       = {10.1007/978-3-662-47989-6\_30},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/KarpmanPS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarpmanPS15,
  author    = {Pierre Karpman and
               Thomas Peyrin and
               Marc Stevens},
  title     = {Practical Free-Start Collision Attacks on 76-step {SHA-1}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {530},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/530},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KarpmanPS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StevensKP15,
  author    = {Marc Stevens and
               Pierre Karpman and
               Thomas Peyrin},
  title     = {Freestart collision on full {SHA-1}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {967},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/967},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/StevensKP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Stevens13,
  author    = {Marc Stevens},
  title     = {Counter-Cryptanalysis},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {129--146},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4\_8},
  doi       = {10.1007/978-3-642-40041-4\_8},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/Stevens13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Stevens13,
  author    = {Marc Stevens},
  title     = {New Collision Attacks on {SHA-1} Based on Optimal Joint Local-Collision
               Analysis},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  pages     = {245--261},
  year      = {2013},
  crossref  = {DBLP:conf/eurocrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9\_15},
  doi       = {10.1007/978-3-642-38348-9\_15},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Stevens13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stevens13,
  author    = {Marc Stevens},
  title     = {Counter-cryptanalysis},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {358},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/358},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Stevens13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/StevensLW12,
  author    = {Marc Stevens and
               Arjen K. Lenstra and
               Benne de Weger},
  title     = {Chosen-prefix collisions for {MD5} and applications},
  journal   = {{IJACT}},
  volume    = {2},
  number    = {4},
  pages     = {322--359},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJACT.2012.048084},
  doi       = {10.1504/IJACT.2012.048084},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijact/StevensLW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/Stevens12,
  author    = {Marc Stevens},
  title     = {Advances in Hash Function Cryptanalysis},
  journal   = {{ERCIM} News},
  volume    = {2012},
  number    = {90},
  year      = {2012},
  url       = {http://ercim-news.ercim.eu/en90/special/advances-in-hash-function-cryptanalysis},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ercim/Stevens12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stevens12,
  author    = {Marc Stevens},
  title     = {Single-block collision attack on {MD5}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {40},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/040},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Stevens12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StevensSALMOW09,
  author    = {Marc Stevens and
               Alexander Sotirov and
               Jacob Appelbaum and
               Arjen K. Lenstra and
               David Molnar and
               Dag Arne Osvik and
               Benne de Weger},
  title     = {Short Chosen-Prefix Collisions for {MD5} and the Creation of a Rogue
               {CA} Certificate},
  booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  pages     = {55--69},
  year      = {2009},
  crossref  = {DBLP:conf/crypto/2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8\_4},
  doi       = {10.1007/978-3-642-03356-8\_4},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/StevensSALMOW09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/Stevens09,
  author    = {Marc Stevens},
  title     = {Breaking the Weakest Link: Becoming a Trusted Authority on the Internet},
  journal   = {{ERCIM} News},
  volume    = {2009},
  number    = {77},
  year      = {2009},
  url       = {http://ercim-news.ercim.eu/en77/special/breaking-the-weakest-link-becoming-a-trusted-authority-on-the-internet},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ercim/Stevens09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StevensSALMOW09,
  author    = {Marc Stevens and
               Alexander Sotirov and
               Jacob Appelbaum and
               Arjen K. Lenstra and
               David Molnar and
               Dag Arne Osvik and
               Benne de Weger},
  title     = {Short Chosen-Prefix Collisions for {MD5} and the Creation of a Rogue
               {CA} Certificate},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {111},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/111},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/StevensSALMOW09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/StevensLW07,
  author    = {Marc Stevens and
               Arjen K. Lenstra and
               Benne de Weger},
  title     = {Chosen-Prefix Collisions for {MD5} and Colliding {X.509} Certificates
               for Different Identities},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  pages     = {1--22},
  year      = {2007},
  crossref  = {DBLP:conf/eurocrypt/2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4\_1},
  doi       = {10.1007/978-3-540-72540-4\_1},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/StevensLW07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stevens06,
  author    = {Marc Stevens},
  title     = {Fast Collision Attack on {MD5}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {104},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/104},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Stevens06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StevensLW06,
  author    = {Marc Stevens and
               Arjen K. Lenstra and
               Benne de Weger},
  title     = {Target Collisions for {MD5} and Colliding {X.509} Certificates for
               Different Identities},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {360},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/360},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/StevensLW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LangeS04,
  author    = {Tanja Lange and
               Marc Stevens},
  title     = {Efficient Doubling on Genus Two Curves over Binary Fields},
  booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
               2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  pages     = {170--181},
  year      = {2004},
  crossref  = {DBLP:conf/sacrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-30564-4\_12},
  doi       = {10.1007/978-3-540-30564-4\_12},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/LangeS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-1,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10401},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63688-7},
  doi       = {10.1007/978-3-319-63688-7},
  isbn      = {978-3-319-63687-0},
  timestamp = {Mon, 14 Aug 2017 14:32:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issac/2017,
  editor    = {Michael A. Burr and
               Chee K. Yap and
               Mohab Safey El Din},
  title     = {Proceedings of the 2017 {ACM} on International Symposium on Symbolic
               and Algebraic Computation, {ISSAC} 2017, Kaiserslautern, Germany,
               July 25-28, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3087604},
  doi       = {10.1145/3087604},
  isbn      = {978-1-4503-5064-8},
  timestamp = {Tue, 06 Nov 2018 16:57:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/issac/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2017,
  editor    = {Engin Kirda and
               Thomas Ristenpart},
  title     = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017},
  publisher = {{USENIX} Association},
  year      = {2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17},
  timestamp = {Fri, 01 Sep 2017 12:24:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-1,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9665},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49890-3},
  doi       = {10.1007/978-3-662-49890-3},
  isbn      = {978-3-662-49889-7},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2016,
  editor    = {Roberto Avanzi and
               Howard M. Heys},
  title     = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
               St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10532},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-69453-5},
  doi       = {10.1007/978-3-319-69453-5},
  isbn      = {978-3-319-69452-8},
  timestamp = {Sat, 24 Nov 2018 11:59:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-2,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3},
  doi       = {10.1007/978-3-662-48800-3},
  isbn      = {978-3-662-48799-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-1,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9215},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47989-6},
  doi       = {10.1007/978-3-662-47989-6},
  isbn      = {978-3-662-47988-9},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40041-4},
  doi       = {10.1007/978-3-642-40041-4},
  isbn      = {978-3-642-40040-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2013-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9},
  doi       = {10.1007/978-3-642-38348-9},
  isbn      = {978-3-642-38347-2},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2009,
  editor    = {Shai Halevi},
  title     = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5677},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8},
  doi       = {10.1007/978-3-642-03356-8},
  isbn      = {978-3-642-03355-1},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2007,
  editor    = {Moni Naor},
  title     = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4515},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4},
  doi       = {10.1007/978-3-540-72540-4},
  isbn      = {978-3-540-72539-8},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2004,
  editor    = {Helena Handschuh and
               M. Anwar Hasan},
  title     = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
               2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3357},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b105103},
  doi       = {10.1007/b105103},
  isbn      = {3-540-24327-5},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier