BibTeX records: Martin R. Albrecht

download as .bib file

@inproceedings{DBLP:conf/acns/Aguilar-Melchor17,
  author    = {Carlos Aguilar{-}Melchor and
               Martin R. Albrecht and
               Thomas Ricosset},
  title     = {Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based
               Cryptography},
  booktitle = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  pages     = {3--19},
  year      = {2017},
  crossref  = {DBLP:conf/acns/2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1_1},
  doi       = {10.1007/978-3-319-61204-1_1},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/Aguilar-Melchor17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlbrechtOPPS17,
  author    = {Martin R. Albrecht and
               Emmanuela Orsini and
               Kenneth G. Paterson and
               Guy Peer and
               Nigel P. Smart},
  title     = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts},
  booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {I}},
  pages     = {29--46},
  year      = {2017},
  crossref  = {DBLP:conf/esorics/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-66402-6_4},
  doi       = {10.1007/978-3-319-66402-6_4},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/esorics/AlbrechtOPPS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Albrecht17,
  author    = {Martin R. Albrecht},
  title     = {On Dual Lattice Attacks Against Small-Secret {LWE} and Parameter Choices
               in HElib and {SEAL}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  pages     = {103--129},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-56614-6_4},
  doi       = {10.1007/978-3-319-56614-6_4},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/Albrecht17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Albrecht17,
  author    = {Martin R. Albrecht},
  title     = {On dual lattice attacks against small-secret {LWE} and parameter choices
               in HElib and {SEAL}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {47},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/047},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/Albrecht17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtOPPS17,
  author    = {Martin R. Albrecht and
               Emmanuela Orsini and
               Kenneth G. Paterson and
               Guy Peer and
               Nigel P. Smart},
  title     = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {354},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/354},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtOPPS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtD17,
  author    = {Martin R. Albrecht and
               Amit Deo},
  title     = {Large Modulus Ring-LWE {\textgreater}= Module-LWE},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {612},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/612},
  timestamp = {Tue, 25 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtD17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/AlbrechtFFHP16,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Pooya Farshim and
               Gottfried Herold and
               Ludovic Perret},
  title     = {Polly Cracker, revisited},
  journal   = {Des. Codes Cryptography},
  volume    = {79},
  number    = {2},
  pages     = {261--302},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10623-015-0048-8},
  doi       = {10.1007/s10623-015-0048-8},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/dcc/AlbrechtFFHP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Albrecht0R0T16,
  author    = {Martin R. Albrecht and
               Lorenzo Grassi and
               Christian Rechberger and
               Arnab Roy and
               Tyge Tiessen},
  title     = {MiMC: Efficient Encryption and Cryptographic Hashing with Minimal
               Multiplicative Complexity},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  pages     = {191--219},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53887-6_7},
  doi       = {10.1007/978-3-662-53887-6_7},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/Albrecht0R0T16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlbrechtDHP16,
  author    = {Martin R. Albrecht and
               Jean Paul Degabriele and
               Torben Brandt Hansen and
               Kenneth G. Paterson},
  title     = {A Surfeit of {SSH} Cipher Suites},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1480--1491},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {http://doi.acm.org/10.1145/2976749.2978364},
  doi       = {10.1145/2976749.2978364},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/AlbrechtDHP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtBD16,
  author    = {Martin R. Albrecht and
               Shi Bai and
               L{\'{e}}o Ducas},
  title     = {A Subfield Lattice Attack on Overstretched {NTRU} Assumptions - Cryptanalysis
               of Some {FHE} and Graded Encoding Schemes},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  pages     = {153--178},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53018-4_6},
  doi       = {10.1007/978-3-662-53018-4_6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/AlbrechtBD16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlbrechtP16,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson},
  title     = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation
               of {TLS}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  pages     = {622--643},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-49890-3_24},
  doi       = {10.1007/978-3-662-49890-3_24},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/AlbrechtP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AlbrechtFHLP16,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Dennis Hofheinz and
               Enrique Larraia and
               Kenneth G. Paterson},
  title     = {Multilinear Maps from Obfuscation},
  booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  pages     = {446--473},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016a1},
  url       = {https://doi.org/10.1007/978-3-662-49096-9_19},
  doi       = {10.1007/978-3-662-49096-9_19},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/AlbrechtFHLP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtBD16,
  author    = {Martin R. Albrecht and
               Shi Bai and
               L{\'{e}}o Ducas},
  title     = {A subfield lattice attack on overstretched {NTRU} assumptions: Cryptanalysis
               of some {FHE} and Graded Encoding Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {127},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/127},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtBD16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGRRT16,
  author    = {Martin R. Albrecht and
               Lorenzo Grassi and
               Christian Rechberger and
               Arnab Roy and
               Tyge Tiessen},
  title     = {MiMC: Efficient Encryption and Cryptographic Hashing with Minimal
               Multiplicative Complexity},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {492},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/492},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtGRRT16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtRSTZ16,
  author    = {Martin R. Albrecht and
               Christian Rechberger and
               Thomas Schneider and
               Tyge Tiessen and
               Michael Zohner},
  title     = {Ciphers for {MPC} and {FHE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {687},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/687},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtRSTZ16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cca/AlbrechtCFFP15,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {Algebraic algorithms for {LWE} problems},
  journal   = {{ACM} Comm. Computer Algebra},
  volume    = {49},
  number    = {2},
  pages     = {62},
  year      = {2015},
  url       = {http://doi.acm.org/10.1145/2815111.2815158},
  doi       = {10.1145/2815111.2815158},
  timestamp = {Tue, 09 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cca/AlbrechtCFFP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/AlbrechtCFFP15,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {On the complexity of the {BKW} algorithm on {LWE}},
  journal   = {Des. Codes Cryptography},
  volume    = {74},
  number    = {2},
  pages     = {325--354},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-013-9864-x},
  doi       = {10.1007/s10623-013-9864-x},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/dcc/AlbrechtCFFP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jmc/AlbrechtPS15,
  author    = {Martin R. Albrecht and
               Rachel Player and
               Sam Scott},
  title     = {On the concrete hardness of Learning with Errors},
  journal   = {J. Mathematical Cryptology},
  volume    = {9},
  number    = {3},
  pages     = {169--203},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0016/jmc-2015-0016.xml},
  timestamp = {Thu, 22 Oct 2015 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jmc/AlbrechtPS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AlbrechtCLL15,
  author    = {Martin R. Albrecht and
               Catalin Cocis and
               Fabien Laguillaumie and
               Adeline Langlois},
  title     = {Implementing Candidate Graded Encoding Schemes from Ideal Lattices},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  pages     = {752--775},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48800-3_31},
  doi       = {10.1007/978-3-662-48800-3_31},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/AlbrechtCLL15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlbrechtR0TZ15,
  author    = {Martin R. Albrecht and
               Christian Rechberger and
               Thomas Schneider and
               Tyge Tiessen and
               Michael Zohner},
  title     = {Ciphers for {MPC} and {FHE}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  pages     = {430--454},
  year      = {2015},
  crossref  = {DBLP:conf/eurocrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-46800-5_17},
  doi       = {10.1007/978-3-662-46800-5_17},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/AlbrechtR0TZ15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtPS15,
  author    = {Martin R. Albrecht and
               Rachel Player and
               Sam Scott},
  title     = {On the concrete hardness of Learning with Errors},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {46},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/046},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtPS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFHLP15,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Dennis Hofheinz and
               Enrique Larraia and
               Kenneth G. Paterson},
  title     = {Multilinear Maps from Obfuscation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {780},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/780},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtFHLP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtP15,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson},
  title     = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation
               of {TLS}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1129},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1129},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtDKLPY14,
  author    = {Martin R. Albrecht and
               Benedikt Driessen and
               Elif Bilge Kavun and
               Gregor Leander and
               Christof Paar and
               Tolga Yal{\c{c}}in},
  title     = {Block Ciphers - Focus on the Linear Layer (feat. {PRIDE)}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {57--76},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2_4},
  doi       = {10.1007/978-3-662-44371-2_4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/AlbrechtDKLPY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtFFP14,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {Lazy Modulus Switching for the {BKW} Algorithm on {LWE}},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  pages     = {429--445},
  year      = {2014},
  crossref  = {DBLP:conf/pkc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0_25},
  doi       = {10.1007/978-3-642-54631-0_25},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/AlbrechtFFP14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtFFPTX14,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret and
               Yosuke Todo and
               Keita Xagawa},
  title     = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on
               New Multivariate Quadratic Assumptions},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  pages     = {446--464},
  year      = {2014},
  crossref  = {DBLP:conf/pkc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0_26},
  doi       = {10.1007/978-3-642-54631-0_26},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/AlbrechtFFPTX14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFFP14,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {Lazy Modulus Switching for the {BKW} Algorithm on {LWE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {19},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/019},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtFFP14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDKLPY14,
  author    = {Martin R. Albrecht and
               Benedikt Driessen and
               Elif Bilge Kavun and
               Gregor Leander and
               Christof Paar and
               Tolga Yal{\c{c}}in},
  title     = {Block Ciphers - Focus On The Linear Layer (feat. {PRIDE):} Full Version},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {453},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/453},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtDKLPY14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCLL14,
  author    = {Martin R. Albrecht and
               Catalin Cocis and
               Fabien Laguillaumie and
               Adeline Langlois},
  title     = {Improved Parameters and an Implementation of Graded Encoding Schemes
               from Ideal Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {928},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/928},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtCLL14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCFFP14,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {Algebraic Algorithms for {LWE} Problems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {1018},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/1018},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtCFFP14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AlbrechtFG13,
  author    = {Martin R. Albrecht and
               Robert Fitzpatrick and
               Florian G{\"{o}}pfert},
  title     = {On the Efficacy of Solving {LWE} by Reduction to Unique-SVP},
  booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International
               Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  pages     = {293--310},
  year      = {2013},
  crossref  = {DBLP:conf/icisc/2013},
  url       = {https://doi.org/10.1007/978-3-319-12160-4_18},
  doi       = {10.1007/978-3-319-12160-4_18},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/AlbrechtFG13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFFP13,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on
               New Multivariate Quadratic Assumptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {470},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/470},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtFFP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFo13,
  author    = {Martin R. Albrecht and
               Robert Fitzpatrick and
               Florian G{\"{o}}pfert},
  title     = {On the Efficacy of Solving {LWE} by Reduction to Unique-SVP},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {602},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/602},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtFo13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jsc/AlbrechtCFP12,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  title     = {On the relation between the {MXL} family of algorithms and Gr{\"{o}}bner
               basis algorithms},
  journal   = {J. Symb. Comput.},
  volume    = {47},
  number    = {8},
  pages     = {926--941},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.jsc.2012.01.002},
  doi       = {10.1016/j.jsc.2012.01.002},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jsc/AlbrechtCFP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/issac/Albrecht12,
  author    = {Martin R. Albrecht},
  title     = {The {M4RIE} library for dense linear algebra over small fields with
               even characteristic},
  booktitle = {International Symposium on Symbolic and Algebraic Computation, ISSAC'12,
               Grenoble, France - July 22 - 25, 2012},
  pages     = {28--34},
  year      = {2012},
  crossref  = {DBLP:conf/issac/2012},
  url       = {http://doi.acm.org/10.1145/2442829.2442838},
  doi       = {10.1145/2442829.2442838},
  timestamp = {Wed, 27 Feb 2013 10:33:38 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/issac/Albrecht12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AlbrechtL12,
  author    = {Martin R. Albrecht and
               Gregor Leander},
  title     = {An All-In-One Approach to Differential Cryptanalysis for Small Block
               Ciphers},
  booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  pages     = {1--15},
  year      = {2012},
  crossref  = {DBLP:conf/sacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-35999-6_1},
  doi       = {10.1007/978-3-642-35999-6_1},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/AlbrechtL12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/AlbrechtFFHP12,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Jean{-}Charles Faug{\`{e}}re and
               Gottfried Herold and
               Ludovic Perret},
  title     = {Polly Cracker, Revisited},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {19},
  pages     = {165},
  year      = {2012},
  url       = {http://eccc.hpi-web.de/report/2012/165},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/eccc/AlbrechtFFHP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtL12,
  author    = {Martin R. Albrecht and
               Gregor Leander},
  title     = {An All-In-One Approach to Differential Cryptanalysis for Small Block
               Ciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {401},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/401},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtL12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCFFP12,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret},
  title     = {On the Complexity of the {BKW} Algorithm on {LWE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {636},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/636},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtCFFP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/AlbrechtC11,
  author    = {Martin R. Albrecht and
               Carlos Cid},
  title     = {Cold Boot Key Recovery by Solving Polynomial Systems with Noise},
  booktitle = {Applied Cryptography and Network Security - 9th International Conference,
               {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  pages     = {57--72},
  year      = {2011},
  crossref  = {DBLP:conf/acns/2011},
  url       = {https://doi.org/10.1007/978-3-642-21554-4_4},
  doi       = {10.1007/978-3-642-21554-4_4},
  timestamp = {Tue, 23 May 2017 01:13:09 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/AlbrechtC11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AlbrechtFFP11,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  title     = {Polly Cracker, Revisited},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  pages     = {179--196},
  year      = {2011},
  crossref  = {DBLP:conf/asiacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0_10},
  doi       = {10.1007/978-3-642-25385-0_10},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/AlbrechtFFP11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/AlbrechtFPW11,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Kenneth G. Paterson and
               Gaven J. Watson},
  title     = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  pages     = {128--145},
  year      = {2011},
  crossref  = {DBLP:conf/fse/2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9_8},
  doi       = {10.1007/978-3-642-21702-9_8},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/AlbrechtFPW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ima/AlbrechtP11,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson},
  title     = {Breaking an Identity-Based Encryption Scheme Based on {DHIES}},
  booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
               2011, Oxford, UK, December 12-15, 2011. Proceedings},
  pages     = {344--355},
  year      = {2011},
  crossref  = {DBLP:conf/ima/2011},
  url       = {https://doi.org/10.1007/978-3-642-25516-8_21},
  doi       = {10.1007/978-3-642-25516-8_21},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ima/AlbrechtP11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-6549,
  author    = {Martin R. Albrecht and
               Gregory V. Bard and
               Cl{\'{e}}ment Pernet},
  title     = {Efficient Dense Gaussian Elimination over the Finite Field with Two
               Elements},
  journal   = {CoRR},
  volume    = {abs/1111.6549},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.6549},
  archivePrefix = {arXiv},
  eprint    = {1111.6549},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1111-6549},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-6900,
  author    = {Martin R. Albrecht},
  title     = {The {M4RIE} library for dense linear algebra over small fields with
               even characteristic},
  journal   = {CoRR},
  volume    = {abs/1111.6900},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.6900},
  archivePrefix = {arXiv},
  eprint    = {1111.6900},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1111-6900},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtC11,
  author    = {Martin R. Albrecht and
               Carlos Cid},
  title     = {Cold Boot Key Recovery by Solving Polynomial Systems with Noise},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {38},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/038},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtC11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCFP11,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  title     = {On the Relation Between the Mutant Strategy and the Normal Selection
               Strategy in Gr{\"{o}}bner Basis Algorithms},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {164},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/164},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtCFP11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFPW11,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Kenneth G. Paterson and
               Gaven J. Watson},
  title     = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {213},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/213},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtFPW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFFP11,
  author    = {Martin R. Albrecht and
               Pooya Farshim and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  title     = {Polly Cracker, Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {289},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/289},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtFFP11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Albrecht10,
  author    = {Martin R. Albrecht},
  title     = {Algorithmic algebraic techniques and their application to block cipher
               cryptanalysis},
  school    = {Royal Holloway, University of London, Egham, {UK}},
  year      = {2010},
  url       = {http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529770},
  timestamp = {Tue, 17 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/phd/ethos/Albrecht10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/toms/AlbrechtBH10,
  author    = {Martin R. Albrecht and
               Gregory V. Bard and
               William Hart},
  title     = {Algorithm 898: Efficient multiplication of dense matrices over {GF(2)}},
  journal   = {{ACM} Trans. Math. Softw.},
  volume    = {37},
  number    = {1},
  pages     = {9:1--9:14},
  year      = {2010},
  url       = {http://doi.acm.org/10.1145/1644001.1644010},
  doi       = {10.1145/1644001.1644010},
  timestamp = {Thu, 05 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/toms/AlbrechtBH10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cisc/AlbrechtCDFP10,
  author    = {Martin R. Albrecht and
               Carlos Cid and
               Thomas Dullien and
               Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret},
  title     = {Algebraic Precomputations in Differential and Integral Cryptanalysis},
  booktitle = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  pages     = {387--403},
  year      = {2010},
  crossref  = {DBLP:conf/cisc/2010},
  url       = {https://doi.org/10.1007/978-3-642-21518-6_27},
  doi       = {10.1007/978-3-642-21518-6_27},
  timestamp = {Mon, 22 May 2017 17:10:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cisc/AlbrechtCDFP10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1006-1744,
  author    = {Martin R. Albrecht and
               Cl{\'{e}}ment Pernet},
  title     = {Efficient Decomposition of Dense Matrices over {GF(2)}},
  journal   = {CoRR},
  volume    = {abs/1006.1744},
  year      = {2010},
  url       = {http://arxiv.org/abs/1006.1744},
  archivePrefix = {arXiv},
  eprint    = {1006.1744},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-1006-1744},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtP10,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson},
  title     = {Breaking An Identity-Based Encryption Scheme based on {DHIES}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {637},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/637},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtP10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlbrechtGHK09,
  author    = {Martin R. Albrecht and
               Craig Gentry and
               Shai Halevi and
               Jonathan Katz},
  title     = {Attacking cryptographic schemes based on "perturbation polynomials"},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {1--10},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009},
  url       = {http://doi.acm.org/10.1145/1653662.1653664},
  doi       = {10.1145/1653662.1653664},
  timestamp = {Wed, 04 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/AlbrechtGHK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/AlbrechtC09,
  author    = {Martin R. Albrecht and
               Carlos Cid},
  title     = {Algebraic Techniques in Differential Cryptanalysis},
  booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  pages     = {193--208},
  year      = {2009},
  crossref  = {DBLP:conf/fse/2009},
  url       = {https://doi.org/10.1007/978-3-642-03317-9_12},
  doi       = {10.1007/978-3-642-03317-9_12},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/AlbrechtC09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlbrechtPW09,
  author    = {Martin R. Albrecht and
               Kenneth G. Paterson and
               Gaven J. Watson},
  title     = {Plaintext Recovery Attacks against {SSH}},
  booktitle = {30th {IEEE} Symposium on Security and Privacy (S{\&}P 2009), 17-20
               May 2009, Oakland, California, {USA}},
  pages     = {16--26},
  year      = {2009},
  crossref  = {DBLP:conf/sp/2009},
  url       = {https://doi.org/10.1109/SP.2009.5},
  doi       = {10.1109/SP.2009.5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sp/AlbrechtPW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGHK09,
  author    = {Martin R. Albrecht and
               Craig Gentry and
               Shai Halevi and
               Jonathan Katz},
  title     = {Attacking Cryptographic Schemes Based on "Perturbation Polynomials"},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {98},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/098},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtGHK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cryptologia/Albrecht08,
  author    = {Martin R. Albrecht},
  title     = {Algebraic Attacks on the Courtois Toy Cipher},
  journal   = {Cryptologia},
  volume    = {32},
  number    = {3},
  pages     = {220--276},
  year      = {2008},
  url       = {https://doi.org/10.1080/01611190802058139},
  doi       = {10.1080/01611190802058139},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cryptologia/Albrecht08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-0811-1714,
  author    = {Martin R. Albrecht and
               Gregory V. Bard and
               William Hart},
  title     = {Efficient Multiplication of Dense Matrices over {GF(2)}},
  journal   = {CoRR},
  volume    = {abs/0811.1714},
  year      = {2008},
  url       = {http://arxiv.org/abs/0811.1714},
  archivePrefix = {arXiv},
  eprint    = {0811.1714},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-0811-1714},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtC08,
  author    = {Martin R. Albrecht and
               Carlos Cid},
  title     = {Algebraic Techniques in Differential Cryptanalysis},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {177},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/177},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlbrechtC08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/clawar/AlbrechtBPSSK05,
  author    = {Martin R. Albrecht and
               Till Backhaus and
               Steffen Planthaber and
               Henning St{\"{o}}pler and
               Dirk Spenneberg and
               Frank Kirchner},
  title     = {{AIMEE:} {A} Four-Legged Robot for RoboCup Rescue},
  booktitle = {Climbing and Walking Robots - Proceedings of the 8th International
               Conference on Climbing and Walking Robots and the Support Technologies
               for Mobile Machines, {CLAWAR} 2005, London, UK, September 13-15, 2005},
  pages     = {1003--1010},
  year      = {2005},
  crossref  = {DBLP:conf/clawar/2005},
  url       = {https://doi.org/10.1007/3-540-26415-9_120},
  doi       = {10.1007/3-540-26415-9_120},
  timestamp = {Wed, 24 May 2017 08:28:38 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/clawar/AlbrechtBPSSK05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2017,
  editor    = {Dieter Gollmann and
               Atsuko Miyaji and
               Hiroaki Kikuchi},
  title     = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10355},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1},
  doi       = {10.1007/978-3-319-61204-1},
  isbn      = {978-3-319-61203-4},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017-1,
  editor    = {Simon N. Foley and
               Dieter Gollmann and
               Einar Snekkenes},
  title     = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10492},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-66402-6},
  doi       = {10.1007/978-3-319-66402-6},
  isbn      = {978-3-319-66401-9},
  timestamp = {Fri, 01 Sep 2017 14:18:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/esorics/2017-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-2,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10211},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56614-6},
  doi       = {10.1007/978-3-319-56614-6},
  isbn      = {978-3-319-56613-9},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2017-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-1,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10031},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53887-6},
  doi       = {10.1007/978-3-662-53887-6},
  isbn      = {978-3-662-53886-9},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2016-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-1,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9814},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53018-4},
  doi       = {10.1007/978-3-662-53018-4},
  isbn      = {978-3-662-53017-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2016-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-1,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9665},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49890-3},
  doi       = {10.1007/978-3-662-49890-3},
  isbn      = {978-3-662-49889-7},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2016-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016a1,
  editor    = {Eyal Kushilevitz and
               Tal Malkin},
  title     = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9562},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49096-9},
  doi       = {10.1007/978-3-662-49096-9},
  isbn      = {978-3-662-49095-2},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2016a1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-2,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3},
  doi       = {10.1007/978-3-662-48800-3},
  isbn      = {978-3-662-48799-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2015-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-1,
  editor    = {Elisabeth Oswald and
               Marc Fischlin},
  title     = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9056},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46800-5},
  doi       = {10.1007/978-3-662-46800-5},
  isbn      = {978-3-662-46799-2},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2015-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2014,
  editor    = {Hugo Krawczyk},
  title     = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0},
  doi       = {10.1007/978-3-642-54631-0},
  isbn      = {978-3-642-54630-3},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2013,
  editor    = {Hyang{-}Sook Lee and
               Dong{-}Guk Han},
  title     = {Information Security and Cryptology - {ICISC} 2013 - 16th International
               Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8565},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12160-4},
  doi       = {10.1007/978-3-319-12160-4},
  isbn      = {978-3-319-12159-8},
  timestamp = {Fri, 26 May 2017 00:51:03 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/issac/2012,
  editor    = {Joris van der Hoeven and
               Mark van Hoeij},
  title     = {International Symposium on Symbolic and Algebraic Computation, ISSAC'12,
               Grenoble, France - July 22 - 25, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2442829},
  isbn      = {978-1-4503-1269-1},
  timestamp = {Wed, 27 Feb 2013 10:33:38 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/issac/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2012,
  editor    = {Lars R. Knudsen and
               Huapeng Wu},
  title     = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7707},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-35999-6},
  doi       = {10.1007/978-3-642-35999-6},
  isbn      = {978-3-642-35998-9},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2011,
  editor    = {Javier Lopez and
               Gene Tsudik},
  title     = {Applied Cryptography and Network Security - 9th International Conference,
               {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6715},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21554-4},
  doi       = {10.1007/978-3-642-21554-4},
  isbn      = {978-3-642-21553-7},
  timestamp = {Tue, 23 May 2017 01:13:09 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2011,
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0},
  doi       = {10.1007/978-3-642-25385-0},
  isbn      = {978-3-642-25384-3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2011,
  editor    = {Antoine Joux},
  title     = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6733},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9},
  doi       = {10.1007/978-3-642-21702-9},
  isbn      = {978-3-642-21701-2},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ima/2011,
  editor    = {Liqun Chen},
  title     = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
               2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7089},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25516-8},
  doi       = {10.1007/978-3-642-25516-8},
  isbn      = {978-3-642-25515-1},
  timestamp = {Fri, 26 May 2017 00:49:09 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ima/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cisc/2010,
  editor    = {Xuejia Lai and
               Moti Yung and
               Dongdai Lin},
  title     = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6584},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21518-6},
  doi       = {10.1007/978-3-642-21518-6},
  isbn      = {978-3-642-21517-9},
  timestamp = {Mon, 22 May 2017 17:10:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cisc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009,
  editor    = {Ehab Al{-}Shaer and
               Somesh Jha and
               Angelos D. Keromytis},
  title     = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-894-0},
  timestamp = {Wed, 25 Nov 2009 10:26:38 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2009,
  editor    = {Orr Dunkelman},
  title     = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5665},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03317-9},
  doi       = {10.1007/978-3-642-03317-9},
  isbn      = {978-3-642-03316-2},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2009,
  title     = {30th {IEEE} Symposium on Security and Privacy (S{\&}P 2009), 17-20
               May 2009, Oakland, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5207631},
  isbn      = {978-0-7695-3633-0},
  timestamp = {Thu, 08 Jan 2015 16:59:42 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/sp/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/clawar/2005,
  editor    = {Mohammad Osman Tokhi and
               Gurvinder S. Virk and
               M. Alamgir Hossain},
  title     = {Climbing and Walking Robots - Proceedings of the 8th International
               Conference on Climbing and Walking Robots and the Support Technologies
               for Mobile Machines, {CLAWAR} 2005, London, UK, September 13-15, 2005},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/3-540-26415-9},
  doi       = {10.1007/3-540-26415-9},
  isbn      = {978-3-540-26413-2},
  timestamp = {Wed, 24 May 2017 08:28:38 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/clawar/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier