BibTeX records: Weiqiang Wen

download as .bib file

@article{DBLP:journals/joc/BoudgoustJRW23,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {On the Hardness of Module Learning with Errors with Short Distributions},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {1},
  pages        = {1},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-022-09441-3},
  doi          = {10.1007/S00145-022-09441-3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BoudgoustJRW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FouqueGQRW23,
  author       = {Pierre{-}Alain Fouque and
                  Adela Georgescu and
                  Chen Qian and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {A Generic Transform from Multi-round Interactive Proof to {NIZK}},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {461--481},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_16},
  doi          = {10.1007/978-3-031-31371-4\_16},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FouqueGQRW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueGQRW23,
  author       = {Pierre{-}Alain Fouque and
                  Adela Georgescu and
                  Chen Qian and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {A Generic Transform from Multi-Round Interactive Proof to {NIZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/334},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueGQRW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EsserMVW22,
  author       = {Andre Esser and
                  Alexander May and
                  Javier A. Verbel and
                  Weiqiang Wen},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Partial Key Exposure Attacks on BIKE, Rainbow and {NTRU}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {346--375},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_12},
  doi          = {10.1007/978-3-031-15982-4\_12},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EsserMVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BoudgoustJRW22,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  editor       = {Takanori Isobe and
                  Santanu Sarkar},
  title        = {Entropic Hardness of Module-LWE from Module-NTRU},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13774},
  pages        = {78--99},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22912-1\_4},
  doi          = {10.1007/978-3-031-22912-1\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BoudgoustJRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-16993,
  author       = {Xingyu Yan and
                  Licheng Wang and
                  Weiqiang Wen and
                  Ziyi Li and
                  Jingwen Suo and
                  Lize Gu},
  title        = {Post-Quantum {\(\kappa\)}-to-1 Trapdoor Claw-free Functions from Extrapolated
                  Dihedral Cosets},
  journal      = {CoRR},
  volume       = {abs/2211.16993},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.16993},
  doi          = {10.48550/ARXIV.2211.16993},
  eprinttype    = {arXiv},
  eprint       = {2211.16993},
  timestamp    = {Fri, 02 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-16993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudgoustJRW22,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {Entropic Hardness of Module-LWE from Module-NTRU},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/245},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudgoustJRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsserMVW22,
  author       = {Andre Esser and
                  Alexander May and
                  Javier A. Verbel and
                  Weiqiang Wen},
  title        = {Partial Key Exposure Attacks on BIKE, Rainbow and {NTRU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/259},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EsserMVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudgoustJRW22a,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {On the Hardness of Module Learning With Errors with Short Distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/472},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudgoustJRW22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BoudgoustJRW21,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  editor       = {Kenneth G. Paterson},
  title        = {On the Hardness of Module-LWE with Binary Secret},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {503--526},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_21},
  doi          = {10.1007/978-3-030-75539-3\_21},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BoudgoustJRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudgoustJRW21,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {On the Hardness of Module-LWE with Binary Secret},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/265},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudgoustJRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoudgoustJRW20,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Towards Classical Hardness of Module-LWE: The Linear Rank Case},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {289--317},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_10},
  doi          = {10.1007/978-3-030-64834-3\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoudgoustJRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtBFKSW20,
  author       = {Martin R. Albrecht and
                  Shi Bai and
                  Pierre{-}Alain Fouque and
                  Paul Kirchner and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k\({}^{\mbox{1/(2k)}}\)
                  Time k\({}^{\mbox{k/8+o(k)}}\)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {186--212},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_7},
  doi          = {10.1007/978-3-030-56880-1\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlbrechtBFKSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtBFKSW20,
  author       = {Martin R. Albrecht and
                  Shi Bai and
                  Pierre{-}Alain Fouque and
                  Paul Kirchner and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  title        = {Faster Enumeration-based Lattice Reduction: Root Hermite Factor k{\^{}}(1/(2k))
                  in Time k{\^{}}(k/8 + o(k))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/707},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtBFKSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudgoustJRW20,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {Towards Classical Hardness of Module-LWE: The Linear Rank Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1020},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1020},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudgoustJRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BaiMW19,
  author       = {Shi Bai and
                  Shaun Miller and
                  Weiqiang Wen},
  editor       = {Johannes Buchmann and
                  Abderrahmane Nitaj and
                  Tajje{-}eddine Rachidi},
  title        = {A Refined Analysis of the Cost for Solving {LWE} via uSVP},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
                  on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11627},
  pages        = {181--205},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23696-0\_10},
  doi          = {10.1007/978-3-030-23696-0\_10},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BaiMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiBDRWZ19,
  author       = {Shi Bai and
                  Katharina Boudgoust and
                  Dipayan Das and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen and
                  Zhenfei Zhang},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Middle-Product Learning with Rounding Problem and Its Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  pages        = {55--81},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5\_3},
  doi          = {10.1007/978-3-030-34578-5\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaiBDRWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiMW19,
  author       = {Shi Bai and
                  Shaun Miller and
                  Weiqiang Wen},
  title        = {A refined analysis of the cost for solving {LWE} via uSVP},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/502},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiBDRWZ19,
  author       = {Shi Bai and
                  Katharina Boudgoust and
                  Dipayan Das and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen and
                  Zhenfei Zhang},
  title        = {Middle-Product Learning with Rounding Problem and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1001},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1001},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiBDRWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Wen18,
  author       = {Weiqiang Wen},
  title        = {Contributions to the hardness foundations of lattice-based cryptography.
                  (Contributions aux fondements de complexit{\'{e}} de la cryptographie
                  sur r{\'{e}}seaux)},
  school       = {University of Lyon, France},
  year         = {2018},
  url          = {https://tel.archives-ouvertes.fr/tel-01949339},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Wen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiSW18,
  author       = {Shi Bai and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Measuring, Simulating and Exploiting the Head Concavity Phenomenon
                  in {BKZ}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11272},
  pages        = {369--404},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03326-2\_13},
  doi          = {10.1007/978-3-030-03326-2\_13},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaiSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrakerskiKSW18,
  author       = {Zvika Brakerski and
                  Elena Kirshanova and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Learning with Errors and Extrapolated Dihedral Cosets},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {702--727},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_24},
  doi          = {10.1007/978-3-319-76581-5\_24},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrakerskiKSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiSW18,
  author       = {Shi Bai and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  title        = {Measuring, simulating and exploiting the head concavity phenomenon
                  in {BKZ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/856},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-08223,
  author       = {Zvika Brakerski and
                  Elena Kirshanova and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  title        = {Learning With Errors and Extrapolated Dihedral Cosets},
  journal      = {CoRR},
  volume       = {abs/1710.08223},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.08223},
  eprinttype    = {arXiv},
  eprint       = {1710.08223},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-08223.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WenWP16,
  author       = {Weiqiang Wen and
                  Libin Wang and
                  Jiaxin Pan},
  title        = {Unified security model of authenticated key exchange with specific
                  adversarial capabilities},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {8--17},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0234},
  doi          = {10.1049/IET-IFS.2014.0234},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WenWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BaiSW16,
  author       = {Shi Bai and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  editor       = {Ioannis Chatzigiannakis and
                  Michael Mitzenmacher and
                  Yuval Rabani and
                  Davide Sangiorgi},
  title        = {Improved Reduction from the Bounded Distance Decoding Problem to the
                  Unique Shortest Vector Problem in Lattices},
  booktitle    = {43rd International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  series       = {LIPIcs},
  volume       = {55},
  pages        = {76:1--76:12},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2016},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2016.76},
  doi          = {10.4230/LIPICS.ICALP.2016.76},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BaiSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiSW16,
  author       = {Shi Bai and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  title        = {Improved Reduction from the Bounded Distance Decoding Problem to the
                  Unique Shortest Vector Problem in Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/753},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WenWX14a,
  author       = {Weiqiang Wen and
                  Libin Wang and
                  Min Xie},
  title        = {One-Round Deniable Key Exchange with Perfect Forward Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/661},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WenWX14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WenWP13,
  author       = {Weiqiang Wen and
                  Libin Wang and
                  Jiaxin Pan},
  title        = {A Unified Security Model of Authenticated Key Exchange with Specific
                  Adversarial Capabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {871},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/871},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WenWP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics