Search dblp for Publications

export results for "stream:streams/conf/mycrypt:"

 download as .bib file

@proceedings{DBLP:conf/mycrypt/2016,
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61273-7},
  doi          = {10.1007/978-3-319-61273-7},
  isbn         = {978-3-319-61272-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/ArriagaI016,
  author       = {Afonso Arriaga and
                  Vincenzo Iovino and
                  Qiang Tang},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Updatable Functional Encryption},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {347--363},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_17},
  doi          = {10.1007/978-3-319-61273-7\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/ArriagaI016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/BehniaTH16,
  author       = {Rouzbeh Behnia and
                  Syh{-}Yuan Tan and
                  Swee{-}Huay Heng},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Cryptanalysis of an Identity-Based Convertible Undeniable Signature
                  Scheme},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {474--477},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_23},
  doi          = {10.1007/978-3-319-61273-7\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/BehniaTH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/BeunardeauFGN16,
  author       = {Marc Beunardeau and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Honey Encryption for Language - Robbing Shannon to Pay Turing?},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_7},
  doi          = {10.1007/978-3-319-61273-7\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/BeunardeauFGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/BoydBCH16,
  author       = {Colin Boyd and
                  Xavier Boyen and
                  Christopher Carr and
                  Thomas Haines},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Key Recovery: Inert and Public},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {111--126},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_6},
  doi          = {10.1007/978-3-319-61273-7\_6},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/BoydBCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Boyen16,
  author       = {Xavier Boyen},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {The Case For Human Primacy in Cryptography - (Summary from the Keynote
                  Lecture)},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {3--10},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_1},
  doi          = {10.1007/978-3-319-61273-7\_1},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Boyen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/ChatterjeeKMS16,
  author       = {Sanjit Chatterjee and
                  Neal Koblitz and
                  Alfred Menezes and
                  Palash Sarkar},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Another Look at Tightness {II:} Practical Issues in Cryptography},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {21--55},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_3},
  doi          = {10.1007/978-3-319-61273-7\_3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/ChatterjeeKMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Courtois16,
  author       = {Nicolas T. Courtois},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {506--520},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_27},
  doi          = {10.1007/978-3-319-61273-7\_27},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Courtois16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/CrepeauY16,
  author       = {Claude Cr{\'{e}}peau and
                  Nan Yang},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Multi-prover Interactive Proofs: Unsound Foundations},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {485--493},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_25},
  doi          = {10.1007/978-3-319-61273-7\_25},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/CrepeauY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/FerradiGN16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Human Public-Key Encryption},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {494--505},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_26},
  doi          = {10.1007/978-3-319-61273-7\_26},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/FerradiGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/FrancisANHMS16,
  author       = {Danny Francis and
                  Syarifah Ruqayyah Aljunid and
                  Takuya Nishida and
                  Yu{-}ichi Hayashi and
                  Takaaki Mizuki and
                  Hideaki Sone},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit
                  Output Functions},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {193--211},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_10},
  doi          = {10.1007/978-3-319-61273-7\_10},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/FrancisANHMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Fujioka16,
  author       = {Atsushi Fujioka},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement
                  with Multiple Private Key Generators},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {436--460},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_21},
  doi          = {10.1007/978-3-319-61273-7\_21},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Fujioka16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/GaltelandG16,
  author       = {Herman Galteland and
                  Kristian Gj{\o}steen},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Malware, Encryption, and Rerandomization - Everything Is Under Attack},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {233--251},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_12},
  doi          = {10.1007/978-3-319-61273-7\_12},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/GaltelandG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/GaltelandMO16,
  author       = {Herman Galteland and
                  Stig Fr. Mj{\o}lsnes and
                  Ruxandra F. Olimid},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Attacks on the Basic cMix Design: On the Necessity of Commitments
                  and Randomized Partial Checking},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {463--473},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_22},
  doi          = {10.1007/978-3-319-61273-7\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/GaltelandMO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/HaleCG16,
  author       = {Britta Hale and
                  Christopher Carr and
                  Danilo Gligoroski},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {{CARIBE:} Cascaded {IBE} for Maximum Flexibility and User-Side Control},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {389--408},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_19},
  doi          = {10.1007/978-3-319-61273-7\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/HaleCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Hanaoka16,
  author       = {Goichiro Hanaoka},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Towards User-Friendly Cryptography},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {481--484},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_24},
  doi          = {10.1007/978-3-319-61273-7\_24},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Hanaoka16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/HanzlikKK16,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Controlled Randomness - {A} Defense Against Backdoors in Cryptographic
                  Devices},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {215--232},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_11},
  doi          = {10.1007/978-3-319-61273-7\_11},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/HanzlikKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Koblitz16,
  author       = {Neal Koblitz},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Time for a Paradigm Shift in Our Disciplinary Culture?},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {11--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_2},
  doi          = {10.1007/978-3-319-61273-7\_2},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Koblitz16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KuchtaM16,
  author       = {Veronika Kuchta and
                  Olivier Markowitch},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Multi-authority Distributed Attribute-Based Encryption with Application
                  to Searchable Encryption on Lattices},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {409--435},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_20},
  doi          = {10.1007/978-3-319-61273-7\_20},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KuchtaM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KulisLZ16,
  author       = {Michal Kulis and
                  Pawel Lorek and
                  Filip Zag{\'{o}}rski},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Randomized Stopping Times and Provably Secure Pseudorandom Permutation
                  Generators},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {145--167},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_8},
  doi          = {10.1007/978-3-319-61273-7\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KulisLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KutylowskiCHKCW16,
  author       = {Miroslaw Kutylowski and
                  Jacek Cichon and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Xiaofeng Chen and
                  Jianfeng Wang},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Protecting Electronic Signatures in Case of Key Leakage},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {252--274},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_13},
  doi          = {10.1007/978-3-319-61273-7\_13},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KutylowskiCHKCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/LaiCCS16,
  author       = {Russell W. F. Lai and
                  Henry K. F. Cheung and
                  Sherman S. M. Chow and
                  Anthony Man{-}Cho So},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Another Look at Anonymous Communication - Security and Modular Constructions},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {56--82},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_4},
  doi          = {10.1007/978-3-319-61273-7\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/LaiCCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/MenezesS016,
  author       = {Alfred Menezes and
                  Palash Sarkar and
                  Shashank Singh},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Challenges with Assessing the Impact of {NFS} Advances on the Security
                  of Pairing-Based Cryptography},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {83--108},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_5},
  doi          = {10.1007/978-3-319-61273-7\_5},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/MenezesS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/MinierP16,
  author       = {Marine Minier and
                  Raphael C.{-}W. Phan},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Tuple Cryptanalysis: Slicing and Fusing Multisets},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {294--320},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_15},
  doi          = {10.1007/978-3-319-61273-7\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/MinierP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Nishimaki16,
  author       = {Ryo Nishimaki},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Watermarking Cryptographic Programs},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {521--543},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_28},
  doi          = {10.1007/978-3-319-61273-7\_28},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Nishimaki16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/SamajderS16,
  author       = {Subhabrata Samajder and
                  Palash Sarkar},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {A New Test Statistic for Key Recovery Attacks Using Multiple Linear
                  Approximations},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {277--293},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_14},
  doi          = {10.1007/978-3-319-61273-7\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/SamajderS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/SharifianSL16,
  author       = {Setareh Sharifian and
                  Reihaneh Safavi{-}Naini and
                  Fuchun Lin},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {A Virtual Wiretap Channel for Secure Message Transmission},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {171--192},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_9},
  doi          = {10.1007/978-3-319-61273-7\_9},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/SharifianSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/SlamanigSU16,
  author       = {Daniel Slamanig and
                  Raphael Spreitzer and
                  Thomas Unterluggauer},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Linking-Based Revocation for Group Signatures: {A} Pragmatic Approach
                  for Efficient Revocation Checks},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {364--388},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_18},
  doi          = {10.1007/978-3-319-61273-7\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/SlamanigSU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Tiessen16,
  author       = {Tyge Tiessen},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {From Higher-Order Differentials to Polytopic Cryptyanalysis},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {544--552},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_29},
  doi          = {10.1007/978-3-319-61273-7\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Tiessen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Todo16,
  author       = {Yosuke Todo},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Division Property: Efficient Method to Estimate Upper Bound of Algebraic
                  Degree},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {553--571},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_30},
  doi          = {10.1007/978-3-319-61273-7\_30},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Todo16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/VolteNM16,
  author       = {Emmanuel Volte and
                  Val{\'{e}}rie Nachef and
                  Nicolas Marri{\`{e}}re},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Improvements of Attacks on Various Feistel Schemes},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {321--344},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_16},
  doi          = {10.1007/978-3-319-61273-7\_16},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/VolteNM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/ArmknechtA05,
  author       = {Frederik Armknecht and
                  Gw{\'{e}}nol{\'{e}} Ars},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Introducing a New Variant of Fast Algebraic Attacks and Minimizing
                  Their Successive Data Complexity},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_3},
  doi          = {10.1007/11554868\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/ArmknechtA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/AugotFS05,
  author       = {Daniel Augot and
                  Matthieu Finiasz and
                  Nicolas Sendrier},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {A Family of Fast Syndrome Based Cryptographic Hash Functions},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {64--83},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_6},
  doi          = {10.1007/11554868\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/AugotFS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/BoydC05,
  author       = {Colin Boyd and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Security of Two-Party Identity-Based Key Agreement},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {229--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_17},
  doi          = {10.1007/11554868\_17},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/BoydC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/ChooBH05,
  author       = {Kim{-}Kwang Raymond Choo and
                  Colin Boyd and
                  Yvonne Hitchcock},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {On Session Key Construction in Provably-Secure Key Establishment Protocols},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {116--131},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_9},
  doi          = {10.1007/11554868\_9},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/ChooBH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/ChowLHY05,
  author       = {Sherman S. M. Chow and
                  Richard W. C. Lui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Identity Based Delegation Network},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {99--115},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_8},
  doi          = {10.1007/11554868\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/ChowLHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/CietS05,
  author       = {Mathieu Ciet and
                  Francesco Sica},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication
                  Algorithm},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_12},
  doi          = {10.1007/11554868\_12},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/CietS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Gjosteen05,
  author       = {Kristian Gj{\o}steen},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Homomorphic Cryptosystems Based on Subgroup Membership Problems},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {314--327},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_22},
  doi          = {10.1007/11554868\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Gjosteen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Imai05,
  author       = {Hideki Imai},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Trends and Challenges for Securer Cryptography in Practice},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {1},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_1},
  doi          = {10.1007/11554868\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Imai05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity
                  Against Group Managers},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {151--170},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_11},
  doi          = {10.1007/11554868\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KomanoOSK05,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Atsushi Shimbo and
                  Shin{-}ichi Kawamura},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {On the Security of Probabilistic Multisignature Schemes and Their
                  Optimality},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {132--150},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_10},
  doi          = {10.1007/11554868\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KomanoOSK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KunzliJM05,
  author       = {Simon K{\"{u}}nzli and
                  Pascal Junod and
                  Willi Meier},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Distinguishing Attacks on T-Functions},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {2--15},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_2},
  doi          = {10.1007/11554868\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KunzliJM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/LeeKHSL05,
  author       = {Changhoon Lee and
                  Jongsung Kim and
                  Seokhie Hong and
                  Jaechul Sung and
                  Sangjin Lee},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {244--262},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_18},
  doi          = {10.1007/11554868\_18},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/LeeKHSL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/LenstraW05,
  author       = {Arjen K. Lenstra and
                  Benjamin M. M. de Weger},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Twin {RSA}},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {222--228},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_16},
  doi          = {10.1007/11554868\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/LenstraW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/MonneratOV05,
  author       = {Jean Monnerat and
                  Yvonne Anne Oswald and
                  Serge Vaudenay},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Optimization of the {MOVA} Undeniable Signature Scheme},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {196--209},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_14},
  doi          = {10.1007/11554868\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/MonneratOV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/NakaharaFP05,
  author       = {Jorge Nakahara Jr. and
                  Daniel Santana de Freitas and
                  Raphael Chung{-}Wei Phan},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {New Multiset Attacks on Rijndael with Large Blocks},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {277--295},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_20},
  doi          = {10.1007/11554868\_20},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/NakaharaFP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Overbeck05,
  author       = {Raphael Overbeck},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {A New Structural Attack for {GPT} and Variants},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {50--63},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_5},
  doi          = {10.1007/11554868\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Overbeck05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/PengBD05,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic
                  Secret Sharing},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {84--98},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_7},
  doi          = {10.1007/11554868\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/PengBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Phan05,
  author       = {Raphael Chung{-}Wei Phan},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Advanced Slide Attacks Revisited: Realigning Slide on {DES}},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {263--276},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_19},
  doi          = {10.1007/11554868\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Phan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Schmidt-SamoaT05,
  author       = {Katja Schmidt{-}Samoa and
                  Tsuyoshi Takagi},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Paillier's Cryptosystem Modulo p\({}^{\mbox{2}}\)q and Its Applications
                  to Trapdoor Commitment Schemes},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {296--313},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_21},
  doi          = {10.1007/11554868\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Schmidt-SamoaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/WolfP05,
  author       = {Christopher Wolf and
                  Bart Preneel},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Equivalent Keys in HFE, C\({}^{\mbox{*}}\), and Variations},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {33--49},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_4},
  doi          = {10.1007/11554868\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/WolfP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/YenLMH05,
  author       = {Sung{-}Ming Yen and
                  Wei{-}Chih Lien and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Power Analysis by Exploiting Chosen Message and Internal Collisions
                  - Vulnerability of Checking Mechanism for RSA-Decryption},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {183--195},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_13},
  doi          = {10.1007/11554868\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/YenLMH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/YoungY05,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Questionable Encryption and Its Applications},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {210--221},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_15},
  doi          = {10.1007/11554868\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/YoungY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mycrypt/2005,
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868},
  doi          = {10.1007/11554868},
  isbn         = {3-540-28938-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics