BibTeX records: Zhenfei Zhang

download as .bib file

@inproceedings{DBLP:conf/acns/LuAZ19,
  author    = {Xingye Lu and
               Man Ho Au and
               Zhenfei Zhang},
  title     = {Raptor: {A} Practical Lattice-Based (Linkable) Ring Signature},
  booktitle = {Applied Cryptography and Network Security - 17th International Conference,
               {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  pages     = {110--130},
  year      = {2019},
  crossref  = {DBLP:conf/acns/2019},
  url       = {https://doi.org/10.1007/978-3-030-21568-2\_6},
  doi       = {10.1007/978-3-030-21568-2\_6},
  timestamp = {Fri, 31 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/LuAZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/DasAZ19,
  author    = {Dipayan Das and
               Man Ho Au and
               Zhenfei Zhang},
  title     = {Ring Signatures Based on Middle-Product Learning with Errors Problems},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
               on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  pages     = {139--156},
  year      = {2019},
  crossref  = {DBLP:conf/africacrypt/2019},
  url       = {https://doi.org/10.1007/978-3-030-23696-0\_8},
  doi       = {10.1007/978-3-030-23696-0\_8},
  timestamp = {Tue, 02 Jul 2019 13:10:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/DasAZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/Zhang19,
  author    = {Zhenfei Zhang},
  title     = {Wetland Environmental Protection and Spatial Distribution of Plant
               Communities in Arid and Semi-Arid Areas of Northwest China},
  booktitle = {8th International Conference on Agro-Geoinformatics, Agro-Geoinformatics
               2019, Istanbul, Turkey, July 16-19, 2019},
  pages     = {1--5},
  year      = {2019},
  crossref  = {DBLP:conf/agro-geoinformatics/2019},
  url       = {https://doi.org/10.1109/Agro-Geoinformatics.2019.8820525},
  doi       = {10.1109/Agro-Geoinformatics.2019.8820525},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/agro-geoinformatics/Zhang19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiBDRWZ19,
  author    = {Shi Bai and
               Katharina Boudgoust and
               Dipayan Das and
               Adeline Roux{-}Langlois and
               Weiqiang Wen and
               Zhenfei Zhang},
  title     = {Middle-Product Learning with Rounding Problem and Its Applications},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  pages     = {55--81},
  year      = {2019},
  crossref  = {DBLP:conf/asiacrypt/2019-1},
  url       = {https://doi.org/10.1007/978-3-030-34578-5\_3},
  doi       = {10.1007/978-3-030-34578-5\_3},
  timestamp = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BaiBDRWZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YangAZXYW19,
  author    = {Rupeng Yang and
               Man Ho Au and
               Zhenfei Zhang and
               Qiuliang Xu and
               Zuoxia Yu and
               William Whyte},
  title     = {Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness:
               Construction and Applications},
  booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
               Proceedings, Part {I}},
  pages     = {147--175},
  year      = {2019},
  crossref  = {DBLP:conf/crypto/2019-1},
  url       = {https://doi.org/10.1007/978-3-030-26948-7\_6},
  doi       = {10.1007/978-3-030-26948-7\_6},
  timestamp = {Fri, 09 Aug 2019 14:20:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/YangAZXYW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BaanBFGLRSTZ19,
  author    = {Hayo Baan and
               Sauvik Bhattacharya and
               Scott R. Fluhrer and
               {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
               Thijs Laarhoven and
               Ronald Rietman and
               Markku{-}Juhani O. Saarinen and
               Ludo Tolhuizen and
               Zhenfei Zhang},
  title     = {Round5: Compact and Fast Post-quantum Public-Key Encryption},
  booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
               2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  pages     = {83--102},
  year      = {2019},
  crossref  = {DBLP:conf/pqcrypto/2019},
  url       = {https://doi.org/10.1007/978-3-030-25510-7\_5},
  doi       = {10.1007/978-3-030-25510-7\_5},
  timestamp = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/BaanBFGLRSTZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/LiuPZ19,
  author    = {Zhen Liu and
               Yanbin Pan and
               Zhenfei Zhang},
  title     = {Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15},
  booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
               2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  pages     = {153--166},
  year      = {2019},
  crossref  = {DBLP:conf/pqcrypto/2019},
  url       = {https://doi.org/10.1007/978-3-030-25510-7\_9},
  doi       = {10.1007/978-3-030-25510-7\_9},
  timestamp = {Mon, 15 Jul 2019 14:30:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/LiuPZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuAZ19,
  author    = {Xingye Lu and
               Man Ho Au and
               Zhenfei Zhang},
  title     = {(Linkable) Ring Signature from Hash-Then-One-Way Signature},
  booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy
               In Computing And Communications / 13th {IEEE} International Conference
               On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
               New Zealand, August 5-8, 2019},
  pages     = {578--585},
  year      = {2019},
  crossref  = {DBLP:conf/trustcom/2019},
  url       = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00083},
  doi       = {10.1109/TrustCom/BigDataSE.2019.00083},
  timestamp = {Thu, 14 Nov 2019 10:35:10 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/LuAZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuPZ19,
  author    = {Zhen Liu and
               Yanbin Pan and
               Zhenfei Zhang},
  title     = {Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {83},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/083},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LiuPZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaanBFGLRSTZ19,
  author    = {Hayo Baan and
               Sauvik Bhattacharya and
               Scott R. Fluhrer and
               {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
               Thijs Laarhoven and
               Ronald Rietman and
               Markku{-}Juhani O. Saarinen and
               Ludo Tolhuizen and
               Zhenfei Zhang},
  title     = {Round5: Compact and Fast Post-Quantum Public-Key Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {90},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/090},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaanBFGLRSTZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuAZ19,
  author    = {Xingye Lu and
               Man Ho Au and
               Zhenfei Zhang},
  title     = {(Linkable) Ring Signature from Hash-Then-One-Way Signature},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {567},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/567},
  timestamp = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LuAZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangAZXYW19,
  author    = {Rupeng Yang and
               Man Ho Au and
               Zhenfei Zhang and
               Qiuliang Xu and
               Zuoxia Yu and
               William Whyte},
  title     = {Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness:
               Construction and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {747},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/747},
  timestamp = {Tue, 16 Jul 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/YangAZXYW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiBDRWZ19,
  author    = {Shi Bai and
               Katharina Boudgoust and
               Dipayan Das and
               Adeline Roux{-}Langlois and
               Weiqiang Wen and
               Zhenfei Zhang},
  title     = {Middle-Product Learning with Rounding Problem and its Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {1001},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1001},
  timestamp = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiBDRWZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasHPWZ19,
  author    = {Dipayan Das and
               Jeffrey Hoffstein and
               Jill Pipher and
               William Whyte and
               Zhenfei Zhang},
  title     = {Modular lattice signatures, revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {1301},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1301},
  timestamp = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DasHPWZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YinWLZCYZ18,
  author    = {Wei Yin and
               Qiaoyan Wen and
               Kaitai Liang and
               Zhenfei Zhang and
               Liqun Chen and
               Hanbing Yan and
               Hua Zhang},
  title     = {Delegation of Decryption Rights With Revocability From Learning With
               Errors},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {61163--61175},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2875069},
  doi       = {10.1109/ACCESS.2018.2875069},
  timestamp = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/access/YinWLZCYZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/DaiWZ18,
  author    = {Wei Dai and
               William Whyte and
               Zhenfei Zhang},
  title     = {Optimizing Polynomial Convolution for NTRUEncrypt},
  journal   = {{IEEE} Trans. Computers},
  volume    = {67},
  number    = {11},
  pages     = {1572--1583},
  year      = {2018},
  url       = {https://doi.org/10.1109/TC.2018.2809723},
  doi       = {10.1109/TC.2018.2809723},
  timestamp = {Wed, 07 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tc/DaiWZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuZA18,
  author    = {Xingye Lu and
               Zhenfei Zhang and
               Man Ho Au},
  title     = {Practical Signatures from the Partial Fourier Recovery Problem Revisited:
               {A} Provably-Secure and Gaussian-Distributed Construction},
  booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
               2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  pages     = {813--820},
  year      = {2018},
  crossref  = {DBLP:conf/acisp/2018},
  url       = {https://doi.org/10.1007/978-3-319-93638-3\_50},
  doi       = {10.1007/978-3-319-93638-3\_50},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/LuZA18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenZZ18,
  author    = {Long Chen and
               Zhenfeng Zhang and
               Zhenfei Zhang},
  title     = {On the Hardness of the Computational Ring-LWR Problem and Its Applications},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  pages     = {435--464},
  year      = {2018},
  crossref  = {DBLP:conf/asiacrypt/2018-1},
  url       = {https://doi.org/10.1007/978-3-030-03326-2\_15},
  doi       = {10.1007/978-3-030-03326-2\_15},
  timestamp = {Tue, 28 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/ChenZZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/SaarinenBGRTZ18,
  author    = {Markku{-}Juhani O. Saarinen and
               Sauvik Bhattacharya and
               {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
               Ronald Rietman and
               Ludo Tolhuizen and
               Zhenfei Zhang},
  title     = {Shorter Messages and Faster Post-Quantum Encryption with Round5 on
               Cortex {M}},
  booktitle = {Smart Card Research and Advanced Applications, 17th International
               Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018,
               Revised Selected Papers},
  pages     = {95--110},
  year      = {2018},
  crossref  = {DBLP:conf/cardis/2018},
  url       = {https://doi.org/10.1007/978-3-030-15462-2\_7},
  doi       = {10.1007/978-3-030-15462-2\_7},
  timestamp = {Tue, 18 Jun 2019 16:58:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/SaarinenBGRTZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DorozHPSSWZ18,
  author    = {Yarkin Dor{\"{o}}z and
               Jeffrey Hoffstein and
               Jill Pipher and
               Joseph H. Silverman and
               Berk Sunar and
               William Whyte and
               Zhenfei Zhang},
  title     = {Fully Homomorphic Encryption from the Finite Field Isomorphism Problem},
  booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
               Brazil, March 25-29, 2018, Proceedings, Part {I}},
  pages     = {125--155},
  year      = {2018},
  crossref  = {DBLP:conf/pkc/2018-1},
  url       = {https://doi.org/10.1007/978-3-319-76578-5\_5},
  doi       = {10.1007/978-3-319-76578-5\_5},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/DorozHPSSWZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiWZ18,
  author    = {Wei Dai and
               William Whyte and
               Zhenfei Zhang},
  title     = {Optimizing polynomial convolution for NTRUEncrypt},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {229},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/229},
  timestamp = {Wed, 07 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DaiWZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZZ18,
  author    = {Long Chen and
               Zhenfeng Zhang and
               Zhenfei Zhang},
  title     = {On the Hardness of the Computational Ring-LWR Problem and its Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {536},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/536},
  timestamp = {Tue, 28 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChenZZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffsteinSWZ18,
  author    = {Jeffrey Hoffstein and
               Joseph H. Silverman and
               William Whyte and
               Zhenfei Zhang},
  title     = {A signature scheme from the finite field isomorphism problem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {675},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/675},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HoffsteinSWZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaarinenBGRTZ18,
  author    = {Markku{-}Juhani O. Saarinen and
               Sauvik Bhattacharya and
               {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
               Ronald Rietman and
               Ludo Tolhuizen and
               Zhenfei Zhang},
  title     = {Shorter Messages and Faster Post-Quantum Encryption with Round5 on
               Cortex {M}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {723},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/723},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SaarinenBGRTZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacharyaGLR18,
  author    = {Sauvik Bhattacharya and
               {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
               Thijs Laarhoven and
               Ronald Rietman and
               Markku{-}Juhani O. Saarinen and
               Ludo Tolhuizen and
               Zhenfei Zhang},
  title     = {Round5: Compact and Fast Post-Quantum Public-Key Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {725},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/725},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BhattacharyaGLR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YinWLZCYZ18,
  author    = {Wei Yin and
               Qiaoyan Wen and
               Kaitai Liang and
               Zhenfei Zhang and
               Liqun Chen and
               Hanbing Yan and
               Hua Zhang},
  title     = {Delegation of Decryption Rights with Revocability from Learning with
               Errors},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {777},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/777},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/YinWLZCYZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuAZ18,
  author    = {Xingye Lu and
               Man Ho Au and
               Zhenfei Zhang},
  title     = {Raptor: {A} Practical Lattice-Based (Linkable) Ring Signature},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {857},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/857},
  timestamp = {Mon, 15 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LuAZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLZJXHL18,
  author    = {Xianhui Lu and
               Yamin Liu and
               Zhenfei Zhang and
               Dingding Jia and
               Haiyang Xue and
               Jingnan He and
               Bao Li},
  title     = {{LAC:} Practical Ring-LWE Based Public-Key Encryption with Byte-Level
               Modulus},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1009},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1009},
  timestamp = {Tue, 13 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LuLZJXHL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AuLZSL17,
  author    = {Man Ho Au and
               Joseph K. Liu and
               Zhenfei Zhang and
               Willy Susilo and
               Jin Li},
  title     = {Anonymous Announcement System {(AAS)} for Electric Vehicle in VANETs},
  journal   = {Comput. J.},
  volume    = {60},
  number    = {4},
  pages     = {588--599},
  year      = {2017},
  url       = {https://doi.org/10.1093/comjnl/bxw082},
  doi       = {10.1093/comjnl/bxw082},
  timestamp = {Wed, 31 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cj/AuLZSL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/ZhangQ17,
  author    = {Zhenfei Zhang and
               Liquan Qu},
  title     = {Correlation between climate warming and changes in agricultural caloric
               resources in arid regions of northwest China},
  booktitle = {2017 6th International Conference on Agro-Geoinformatics, Fairfax,
               VA, USA, August 7-10, 2017},
  pages     = {1--5},
  year      = {2017},
  crossref  = {DBLP:conf/agro-geoinformatics/2017},
  url       = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047004},
  doi       = {10.1109/Agro-Geoinformatics.2017.8047004},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/agro-geoinformatics/ZhangQ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HoffsteinPSSWZ17,
  author    = {Jeffrey Hoffstein and
               Jill Pipher and
               John M. Schanck and
               Joseph H. Silverman and
               William Whyte and
               Zhenfei Zhang},
  title     = {Choosing Parameters for NTRUEncrypt},
  booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
               the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
               2017, Proceedings},
  pages     = {3--18},
  year      = {2017},
  crossref  = {DBLP:conf/ctrsa/2017},
  url       = {https://doi.org/10.1007/978-3-319-52153-4\_1},
  doi       = {10.1007/978-3-319-52153-4\_1},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/HoffsteinPSSWZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DorozHPSSWZ17,
  author    = {Yarkin Dor{\"{o}}z and
               Jeffrey Hoffstein and
               Jill Pipher and
               Joseph H. Silverman and
               Berk Sunar and
               William Whyte and
               Zhenfei Zhang},
  title     = {Fully Homomorphic Encryption from the Finite Field Isomorphism Problem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {548},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/548},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DorozHPSSWZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffsteinPWZ17,
  author    = {Jeffrey Hoffstein and
               Jill Pipher and
               William Whyte and
               Zhenfei Zhang},
  title     = {A signature scheme from Learning with Truncation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {995},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/995},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HoffsteinPWZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaanBGRTTZ17,
  author    = {Hayo Baan and
               Sauvik Bhattacharya and
               {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
               Ronald Rietman and
               Ludo Tolhuizen and
               Jose Luis Torre{-}Arce and
               Zhenfei Zhang},
  title     = {Round2: {KEM} and {PKE} based on {GLWR}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1183},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1183},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaanBGRTTZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SchanckWZ16,
  author    = {John M. Schanck and
               William Whyte and
               Zhenfei Zhang},
  title     = {Circuit-extension handshakes for Tor achieving forward secrecy in
               a quantum world},
  journal   = {PoPETs},
  volume    = {2016},
  number    = {4},
  pages     = {219--236},
  year      = {2016},
  url       = {https://doi.org/10.1515/popets-2016-0037},
  doi       = {10.1515/popets-2016-0037},
  timestamp = {Wed, 20 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/popets/SchanckWZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/DaiSSWZ16,
  author    = {Wei Dai and
               Berk Sunar and
               John M. Schanck and
               William Whyte and
               Zhenfei Zhang},
  title     = {{NTRU} modular lattice signature scheme on {CUDA} GPUs},
  booktitle = {International Conference on High Performance Computing {\&} Simulation,
               {HPCS} 2016, Innsbruck, Austria, July 18-22, 2016},
  pages     = {501--508},
  year      = {2016},
  crossref  = {DBLP:conf/ieeehpcs/2016},
  url       = {https://doi.org/10.1109/HPCSim.2016.7568376},
  doi       = {10.1109/HPCSim.2016.7568376},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ieeehpcs/DaiSSWZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiSSWZ16,
  author    = {Wei Dai and
               John M. Schanck and
               Berk Sunar and
               William Whyte and
               Zhenfei Zhang},
  title     = {{NTRU} Modular Lattice Signature Scheme on {CUDA} GPUs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {471},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/471},
  timestamp = {Wed, 07 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DaiSSWZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PlantardSZ15,
  author    = {Thomas Plantard and
               Willy Susilo and
               Zhenfei Zhang},
  title     = {{LLL} for ideal lattices: re-evaluation of the security of Gentry-Halevi's
               {FHE} scheme},
  journal   = {Des. Codes Cryptogr.},
  volume    = {76},
  number    = {2},
  pages     = {325--344},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-014-9957-1},
  doi       = {10.1007/s10623-014-9957-1},
  timestamp = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/PlantardSZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchanckWZ15,
  author    = {John M. Schanck and
               William Whyte and
               Zhenfei Zhang},
  title     = {A quantum-safe circuit-extension handshake for Tor},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {287},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/287},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SchanckWZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffsteinPSSWZ15,
  author    = {Jeffrey Hoffstein and
               Jill Pipher and
               John M. Schanck and
               Joseph H. Silverman and
               William Whyte and
               Zhenfei Zhang},
  title     = {Choosing Parameters for NTRUEncrypt},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {708},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/708},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HoffsteinPSSWZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffsteinPSSWZ15a,
  author    = {Jeffrey Hoffstein and
               Jill Pipher and
               John M. Schanck and
               Joseph H. Silverman and
               William Whyte and
               Zhenfei Zhang},
  title     = {DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine
               Approximation - Preliminary Report},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {844},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/844},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HoffsteinPSSWZ15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ZhengHZMQ14,
  author    = {Kai Zheng and
               Jie Hu and
               Zhenfei Zhang and
               Jin Ma and
               Jin Qi},
  title     = {An enhancement for heuristic attribute reduction algorithm in rough
               set},
  journal   = {Expert Syst. Appl.},
  volume    = {41},
  number    = {15},
  pages     = {6748--6754},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.eswa.2014.04.042},
  doi       = {10.1016/j.eswa.2014.04.042},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eswa/ZhengHZMQ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PlantardSZ13,
  author    = {Thomas Plantard and
               Willy Susilo and
               Zhenfei Zhang},
  title     = {Fully Homomorphic Encryption Using Hidden Ideal Lattice},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {8},
  number    = {12},
  pages     = {2127--2137},
  year      = {2013},
  url       = {https://doi.org/10.1109/TIFS.2013.2287732},
  doi       = {10.1109/TIFS.2013.2287732},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/PlantardSZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PlantardSZ13,
  author    = {Thomas Plantard and
               Willy Susilo and
               Zhenfei Zhang},
  title     = {Adaptive Precision Floating Point {LLL}},
  booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  pages     = {104--117},
  year      = {2013},
  crossref  = {DBLP:conf/acisp/2013},
  url       = {https://doi.org/10.1007/978-3-642-39059-3\_8},
  doi       = {10.1007/978-3-642-39059-3\_8},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/PlantardSZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangPS12,
  author    = {Zhenfei Zhang and
               Thomas Plantard and
               Willy Susilo},
  title     = {On the {CCA-1} Security of Somewhat Homomorphic Encryption over the
               Integers},
  booktitle = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  pages     = {353--368},
  year      = {2012},
  crossref  = {DBLP:conf/ispec/2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2\_24},
  doi       = {10.1007/978-3-642-29101-2\_24},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/ZhangPS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PlantardSZ12,
  author    = {Thomas Plantard and
               Willy Susilo and
               Zhenfei Zhang},
  title     = {Lattice Reduction for Modular Knapsack},
  booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  pages     = {275--286},
  year      = {2012},
  crossref  = {DBLP:conf/sacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-35999-6\_18},
  doi       = {10.1007/978-3-642-35999-6\_18},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/PlantardSZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/QiHPWZ11,
  author    = {Jin Qi and
               Jie Hu and
               Ying{-}hong Peng and
               Wei{-}ming Wang and
               Zhenfei Zhang},
  title     = {{AGFSM:} An new {FSM} based on adapted Gaussian membership in case
               retrieval model for customer-driven design},
  journal   = {Expert Syst. Appl.},
  volume    = {38},
  number    = {1},
  pages     = {894--905},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.eswa.2010.07.067},
  doi       = {10.1016/j.eswa.2010.07.067},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eswa/QiHPWZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/QiHPRWZ11,
  author    = {Jin Qi and
               Jie Hu and
               Ying{-}hong Peng and
               Qiushi Ren and
               Wei{-}ming Wang and
               Zhenfei Zhang},
  title     = {Integration of similarity measurement and dynamic {SVM} for electrically
               evoked potentials prediction in visual prostheses research},
  journal   = {Expert Syst. Appl.},
  volume    = {38},
  number    = {5},
  pages     = {5044--5060},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.eswa.2010.09.145},
  doi       = {10.1016/j.eswa.2010.09.145},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eswa/QiHPRWZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangPS11,
  author    = {Zhenfei Zhang and
               Thomas Plantard and
               Willy Susilo},
  title     = {Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption
               Schemes},
  booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  pages     = {419--436},
  year      = {2011},
  crossref  = {DBLP:conf/icisc/2011},
  url       = {https://doi.org/10.1007/978-3-642-31912-9\_28},
  doi       = {10.1007/978-3-642-31912-9\_28},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/ZhangPS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/QiHPWZ09,
  author    = {Jin Qi and
               Jie Hu and
               Ying{-}hong Peng and
               Wei{-}ming Wang and
               Zhenfei Zhang},
  title     = {A case retrieval method combined with similarity measurement and multi-criteria
               decision making for concurrent design},
  journal   = {Expert Syst. Appl.},
  volume    = {36},
  number    = {7},
  pages     = {10357--10366},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.eswa.2009.01.042},
  doi       = {10.1016/j.eswa.2009.01.042},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eswa/QiHPWZ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2019,
  editor    = {Robert H. Deng and
               Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
               Mart{\'{\i}}n Ochoa and
               Moti Yung},
  title     = {Applied Cryptography and Network Security - 17th International Conference,
               {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11464},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-21568-2},
  doi       = {10.1007/978-3-030-21568-2},
  isbn      = {978-3-030-21567-5},
  timestamp = {Wed, 29 May 2019 12:25:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2019,
  editor    = {Johannes Buchmann and
               Abderrahmane Nitaj and
               Tajje{-}eddine Rachidi},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
               on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11627},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-23696-0},
  doi       = {10.1007/978-3-030-23696-0},
  isbn      = {978-3-030-23695-3},
  timestamp = {Tue, 02 Jul 2019 13:10:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/agro-geoinformatics/2019,
  title     = {8th International Conference on Agro-Geoinformatics, Agro-Geoinformatics
               2019, Istanbul, Turkey, July 16-19, 2019},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8811423/proceeding},
  isbn      = {978-1-7281-2116-1},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/agro-geoinformatics/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2019-1,
  editor    = {Steven D. Galbraith and
               Shiho Moriai},
  title     = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11921},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-34578-5},
  doi       = {10.1007/978-3-030-34578-5},
  isbn      = {978-3-030-34577-8},
  timestamp = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2019-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2019-1,
  editor    = {Alexandra Boldyreva and
               Daniele Micciancio},
  title     = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11692},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-26948-7},
  doi       = {10.1007/978-3-030-26948-7},
  isbn      = {978-3-030-26947-0},
  timestamp = {Fri, 09 Aug 2019 14:20:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2019-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2019,
  editor    = {Jintai Ding and
               Rainer Steinwandt},
  title     = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
               2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11505},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-25510-7},
  doi       = {10.1007/978-3-030-25510-7},
  isbn      = {978-3-030-25509-1},
  timestamp = {Mon, 15 Jul 2019 14:30:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2019,
  title     = {18th {IEEE} International Conference On Trust, Security And Privacy
               In Computing And Communications / 13th {IEEE} International Conference
               On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
               New Zealand, August 5-8, 2019},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8883860/proceeding},
  isbn      = {978-1-7281-2777-4},
  timestamp = {Thu, 14 Nov 2019 10:35:10 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2018,
  editor    = {Willy Susilo and
               Guomin Yang},
  title     = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
               2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10946},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93638-3},
  doi       = {10.1007/978-3-319-93638-3},
  isbn      = {978-3-319-93637-6},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2018-1,
  editor    = {Thomas Peyrin and
               Steven D. Galbraith},
  title     = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11272},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-03326-2},
  doi       = {10.1007/978-3-030-03326-2},
  isbn      = {978-3-030-03325-5},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2018,
  editor    = {Beg{\"{u}}l Bilgin and
               Jean{-}Bernard Fischer},
  title     = {Smart Card Research and Advanced Applications, 17th International
               Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018,
               Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11389},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-15462-2},
  doi       = {10.1007/978-3-030-15462-2},
  isbn      = {978-3-030-15461-5},
  timestamp = {Tue, 18 Jun 2019 16:58:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2018-1,
  editor    = {Michel Abdalla and
               Ricardo Dahab},
  title     = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
               Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10769},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-76578-5},
  doi       = {10.1007/978-3-319-76578-5},
  isbn      = {978-3-319-76577-8},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/agro-geoinformatics/2017,
  title     = {2017 6th International Conference on Agro-Geoinformatics, Fairfax,
               VA, USA, August 7-10, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8031504/proceeding},
  isbn      = {978-1-5386-3884-2},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/agro-geoinformatics/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2017,
  editor    = {Helena Handschuh},
  title     = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
               the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
               2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10159},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-52153-4},
  doi       = {10.1007/978-3-319-52153-4},
  isbn      = {978-3-319-52152-7},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ieeehpcs/2016,
  title     = {International Conference on High Performance Computing {\&} Simulation,
               {HPCS} 2016, Innsbruck, Austria, July 18-22, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7562293/proceeding},
  isbn      = {978-1-5090-2088-1},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ieeehpcs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2013,
  editor    = {Colin Boyd and
               Leonie Simpson},
  title     = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7959},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39059-3},
  doi       = {10.1007/978-3-642-39059-3},
  isbn      = {978-3-642-39058-6},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2012,
  editor    = {Mark Dermot Ryan and
               Ben Smyth and
               Guilin Wang},
  title     = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7232},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2},
  doi       = {10.1007/978-3-642-29101-2},
  isbn      = {978-3-642-29100-5},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2012,
  editor    = {Lars R. Knudsen and
               Huapeng Wu},
  title     = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7707},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-35999-6},
  doi       = {10.1007/978-3-642-35999-6},
  isbn      = {978-3-642-35998-9},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2011,
  editor    = {Howon Kim},
  title     = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7259},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31912-9},
  doi       = {10.1007/978-3-642-31912-9},
  isbn      = {978-3-642-31911-2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics