BibTeX records: Eyal Ronen

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/AmonDKRS21,
  author    = {Ohad Amon and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Three Third Generation Attacks on the Format Preserving Encryption
               Scheme {FF3}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  pages     = {127--154},
  year      = {2021},
  crossref  = {DBLP:conf/eurocrypt/2021-2},
  url       = {https://doi.org/10.1007/978-3-030-77886-6\_5},
  doi       = {10.1007/978-3-030-77886-6\_5},
  timestamp = {Wed, 16 Jun 2021 11:57:04 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/AmonDKRS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/DunkelmanGKKRST21,
  author    = {Orr Dunkelman and
               Zeev Geyzel and
               Chaya Keller and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir and
               Ran J. Tessler},
  title     = {Error Resilient Space Partitioning (Invited Talk)},
  booktitle = {48th International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2021, July 12-16, 2021, Glasgow, Scotland (Virtual Conference)},
  pages     = {4:1--4:22},
  year      = {2021},
  crossref  = {DBLP:conf/icalp/2021},
  url       = {https://doi.org/10.4230/LIPIcs.ICALP.2021.4},
  doi       = {10.4230/LIPIcs.ICALP.2021.4},
  timestamp = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icalp/DunkelmanGKKRST21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmonDKRS21,
  author    = {Ohad Amon and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Three Third Generation Attacks on the Format Preserving Encryption
               Scheme {FF3}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {335},
  year      = {2021},
  url       = {https://eprint.iacr.org/2021/335},
  timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AmonDKRS21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chuengsatiansup21a,
  author    = {Chitchanok Chuengsatiansup and
               Eyal Ronen and
               Gregory G. Rose and
               Yuval Yarom},
  title     = {Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {828},
  year      = {2021},
  url       = {https://eprint.iacr.org/2021/828},
  timestamp = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Chuengsatiansup21a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Bar-OnDKRS20,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  journal   = {J. Cryptol.},
  volume    = {33},
  number    = {3},
  pages     = {1003--1043},
  year      = {2020},
  url       = {https://doi.org/10.1007/s00145-019-09336-w},
  doi       = {10.1007/s00145-019-09336-w},
  timestamp = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/joc/Bar-OnDKRS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talg/Bar-OnDDHKRS20,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Tight Bounds on Online Checkpointing Algorithms},
  journal   = {{ACM} Trans. Algorithms},
  volume    = {16},
  number    = {3},
  pages     = {31:1--31:22},
  year      = {2020},
  url       = {https://doi.org/10.1145/3379543},
  doi       = {10.1145/3379543},
  timestamp = {Wed, 29 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/talg/Bar-OnDDHKRS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKRS20,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {The Retracing Boomerang Attack},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  pages     = {280--309},
  year      = {2020},
  crossref  = {DBLP:conf/eurocrypt/2020-1},
  url       = {https://doi.org/10.1007/978-3-030-45721-1\_11},
  doi       = {10.1007/978-3-030-45721-1\_11},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKRS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VanhoefR20,
  author    = {Mathy Vanhoef and
               Eyal Ronen},
  title     = {Dragonblood: Analyzing the Dragonfly Handshake of {WPA3} and EAP-pwd},
  booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
               CA, USA, May 18-21, 2020},
  pages     = {517--533},
  year      = {2020},
  crossref  = {DBLP:conf/sp/2020},
  url       = {https://doi.org/10.1109/SP40000.2020.00031},
  doi       = {10.1109/SP40000.2020.00031},
  timestamp = {Thu, 20 Aug 2020 16:31:11 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/VanhoefR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CohneyKPGHRY20,
  author    = {Shaanan Cohney and
               Andrew Kwong and
               Shahar Paz and
               Daniel Genkin and
               Nadia Heninger and
               Eyal Ronen and
               Yuval Yarom},
  title     = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG},
  booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
               CA, USA, May 18-21, 2020},
  pages     = {1241--1258},
  year      = {2020},
  crossref  = {DBLP:conf/sp/2020},
  url       = {https://doi.org/10.1109/SP40000.2020.00046},
  doi       = {10.1109/SP40000.2020.00046},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/CohneyKPGHRY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-03675,
  author    = {Orr Dunkelman and
               Zeev Geyzel and
               Chaya Keller and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir and
               Ran J. Tessler},
  title     = {Consistent High Dimensional Rounding with Side Information},
  journal   = {CoRR},
  volume    = {abs/2008.03675},
  year      = {2020},
  url       = {https://arxiv.org/abs/2008.03675},
  eprinttype = {arXiv},
  eprint    = {2008.03675},
  timestamp = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2008-03675.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR20,
  author    = {Moni Naor and
               Shahar Paz and
               Eyal Ronen},
  title     = {{CRISP:} Compromise Resilient Identity-based Symmetric {PAKE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {529},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/529},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/NaorPR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaorPR19,
  author    = {Moni Naor and
               Benny Pinkas and
               Eyal Ronen},
  title     = {How to (not) Share a Password: Privacy Preserving Protocols for Finding
               Heavy Hitters with Adversarial Behavior},
  booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages     = {1369--1386},
  year      = {2019},
  crossref  = {DBLP:conf/ccs/2019},
  url       = {https://doi.org/10.1145/3319535.3363204},
  doi       = {10.1145/3319535.3363204},
  timestamp = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/NaorPR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RonenGGSWY19,
  author    = {Eyal Ronen and
               Robert Gillham and
               Daniel Genkin and
               Adi Shamir and
               David Wong and
               Yuval Yarom},
  title     = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS}
               Implementations},
  booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
               CA, USA, May 19-23, 2019},
  pages     = {435--452},
  year      = {2019},
  crossref  = {DBLP:conf/sp/2019},
  url       = {https://doi.org/10.1109/SP.2019.00062},
  doi       = {10.1109/SP.2019.00062},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/RonenGGSWY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-10861,
  author    = {Adi Shamir and
               Itay Safran and
               Eyal Ronen and
               Orr Dunkelman},
  title     = {A Simple Explanation for the Existence of Adversarial Examples with
               Small Hamming Distance},
  journal   = {CoRR},
  volume    = {abs/1901.10861},
  year      = {2019},
  url       = {http://arxiv.org/abs/1901.10861},
  eprinttype = {arXiv},
  eprint    = {1901.10861},
  timestamp = {Sun, 03 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1901-10861.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VanhoefR19,
  author    = {Mathy Vanhoef and
               Eyal Ronen},
  title     = {Dragonblood: {A} Security Analysis of WPA3's {SAE} Handshake},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {383},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/383},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/VanhoefR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohneyKPGHRY19,
  author    = {Shaanan Cohney and
               Andrew Kwong and
               Shahar Paz and
               Daniel Genkin and
               Nadia Heninger and
               Eyal Ronen and
               Yuval Yarom},
  title     = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {996},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/996},
  timestamp = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CohneyKPGHRY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKRS19,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {The Retracing Boomerang Attack},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1154},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1154},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/DunkelmanKRS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RonenSWO18,
  author    = {Eyal Ronen and
               Adi Shamir and
               Achi{-}Or Weingarten and
               Colin O'Flynn},
  title     = {IoT Goes Nuclear: Creating a Zigbee Chain Reaction},
  journal   = {{IEEE} Secur. Priv.},
  volume    = {16},
  number    = {1},
  pages     = {54--62},
  year      = {2018},
  url       = {https://doi.org/10.1109/MSP.2018.1331033},
  doi       = {10.1109/MSP.2018.1331033},
  timestamp = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ieeesp/RonenSWO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RonenPS18,
  author    = {Eyal Ronen and
               Kenneth G. Paterson and
               Adi Shamir},
  title     = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  pages     = {1397--1414},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018},
  url       = {https://doi.org/10.1145/3243734.3243775},
  doi       = {10.1145/3243734.3243775},
  timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/RonenPS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bar-OnDKRS18,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  pages     = {185--212},
  year      = {2018},
  crossref  = {DBLP:conf/crypto/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-96881-0\_7},
  doi       = {10.1007/978-3-319-96881-0\_7},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/Bar-OnDKRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Bar-OnDDHKRS18,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Tight Bounds on Online Checkpointing Algorithms},
  booktitle = {45th International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2018, July 9-13, 2018, Prague, Czech Republic},
  pages     = {13:1--13:13},
  year      = {2018},
  crossref  = {DBLP:conf/icalp/2018},
  url       = {https://doi.org/10.4230/LIPIcs.ICALP.2018.13},
  doi       = {10.4230/LIPIcs.ICALP.2018.13},
  timestamp = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl    = {https://dblp.org/rec/conf/icalp/Bar-OnDDHKRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR18,
  author    = {Moni Naor and
               Benny Pinkas and
               Eyal Ronen},
  title     = {How to (not) share a password: Privacy preserving protocols for finding
               heavy hitters with adversarial behavior},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {3},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/003},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/NaorPR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnDKRS18,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {527},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/527},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Bar-OnDKRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenPS18,
  author    = {Eyal Ronen and
               Kenneth G. Paterson and
               Adi Shamir},
  title     = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {747},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/747},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/RonenPS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenGGSWY18,
  author    = {Eyal Ronen and
               Robert Gillham and
               Daniel Genkin and
               Adi Shamir and
               David Wong and
               Yuval Yarom},
  title     = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS}
               Implementations},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1173},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1173},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/RonenGGSWY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RonenSWO17,
  author    = {Eyal Ronen and
               Adi Shamir and
               Achi{-}Or Weingarten and
               Colin O'Flynn},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {195--212},
  year      = {2017},
  crossref  = {DBLP:conf/sp/2017},
  url       = {https://doi.org/10.1109/SP.2017.14},
  doi       = {10.1109/SP.2017.14},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/RonenSWO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Bar-OnDDHKRS17,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Optimal Backup Strategies Against Cyber Attacks},
  journal   = {CoRR},
  volume    = {abs/1704.02659},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.02659},
  eprinttype = {arXiv},
  eprint    = {1704.02659},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/Bar-OnDDHKRS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/RonenS16,
  author    = {Eyal Ronen and
               Adi Shamir},
  title     = {Extended Functionality Attacks on IoT Devices: The Case of Smart Lights},
  booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages     = {3--12},
  year      = {2016},
  crossref  = {DBLP:conf/eurosp/2016},
  url       = {https://doi.org/10.1109/EuroSP.2016.13},
  doi       = {10.1109/EuroSP.2016.13},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/eurosp/RonenS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenOSW16,
  author    = {Eyal Ronen and
               Colin O'Flynn and
               Adi Shamir and
               Achi{-}Or Weingarten},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1047},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1047},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/RonenOSW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2021-2,
  editor    = {Anne Canteaut and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {12697},
  publisher = {Springer},
  year      = {2021},
  url       = {https://doi.org/10.1007/978-3-030-77886-6},
  doi       = {10.1007/978-3-030-77886-6},
  isbn      = {978-3-030-77885-9},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/2021-2.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2021,
  editor    = {Nikhil Bansal and
               Emanuela Merelli and
               James Worrell},
  title     = {48th International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2021, July 12-16, 2021, Glasgow, Scotland (Virtual Conference)},
  series    = {LIPIcs},
  volume    = {198},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year      = {2021},
  url       = {https://www.dagstuhl.de/dagpub/978-3-95977-195-5},
  isbn      = {978-3-95977-195-5},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/icalp/2021.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2020-1,
  editor    = {Anne Canteaut and
               Yuval Ishai},
  title     = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {12105},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-45721-1},
  doi       = {10.1007/978-3-030-45721-1},
  isbn      = {978-3-030-45720-4},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/2020-1.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2020,
  title     = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
               CA, USA, May 18-21, 2020},
  publisher = {{IEEE}},
  year      = {2020},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/9144328/proceeding},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/2020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019,
  editor    = {Lorenzo Cavallaro and
               Johannes Kinder and
               XiaoFeng Wang and
               Jonathan Katz},
  title     = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3319535},
  doi       = {10.1145/3319535},
  isbn      = {978-1-4503-6747-9},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/2019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2019,
  title     = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
               CA, USA, May 19-23, 2019},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8826229/proceeding},
  isbn      = {978-1-5386-6660-9},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/2019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018,
  editor    = {David Lie and
               Mohammad Mannan and
               Michael Backes and
               XiaoFeng Wang},
  title     = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3243734},
  isbn      = {978-1-4503-5693-0},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/2018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2018-2,
  editor    = {Hovav Shacham and
               Alexandra Boldyreva},
  title     = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10992},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-96881-0},
  doi       = {10.1007/978-3-319-96881-0},
  isbn      = {978-3-319-96880-3},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/2018-2.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2018,
  editor    = {Ioannis Chatzigiannakis and
               Christos Kaklamanis and
               D{\'{a}}niel Marx and
               Donald Sannella},
  title     = {45th International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2018, July 9-13, 2018, Prague, Czech Republic},
  series    = {LIPIcs},
  volume    = {107},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year      = {2018},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-076-7},
  isbn      = {978-3-95977-076-7},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/icalp/2018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2017,
  title     = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7957740/proceeding},
  isbn      = {978-1-5090-5533-3},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/2017.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2016,
  title     = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7467055/proceeding},
  isbn      = {978-1-5090-1751-5},
  timestamp = {Wed, 22 Sep 2021 17:49:15 +0200},
  biburl    = {https://dblp.org/rec/conf/eurosp/2016.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics