BibTeX records: Chris Brzuska

download as .bib file

@inproceedings{DBLP:conf/acns/BockBMT18,
  author    = {Estuardo Alpirez Bock and
               Chris Brzuska and
               Wil Michiels and
               Alexander Treff},
  title     = {On the Ineffectiveness of Internal Encodings - Revisiting the {DCA}
               Attack on White-Box Cryptography},
  booktitle = {Applied Cryptography and Network Security - 16th International Conference,
               {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  pages     = {103--120},
  year      = {2018},
  crossref  = {DBLP:conf/acns/2018},
  url       = {https://doi.org/10.1007/978-3-319-93387-0_6},
  doi       = {10.1007/978-3-319-93387-0_6},
  timestamp = {Wed, 13 Jun 2018 13:59:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/BockBMT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockBMT18,
  author    = {Estuardo Alpirez Bock and
               Chris Brzuska and
               Wil Michiels and
               Alexander Treff},
  title     = {On the Ineffectiveness of Internal Encodings - Revisiting the {DCA}
               Attack on White-Box Cryptography},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {301},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/301},
  timestamp = {Thu, 03 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BockBMT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaDKK18,
  author    = {Chris Brzuska and
               Antoine Delignat{-}Lavaud and
               Konrad Kohbrok and
               Markulf Kohlweiss},
  title     = {State-Separating Proofs: {A} Reduction Methodology for Real-World
               Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {306},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/306},
  timestamp = {Thu, 03 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaDKK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/ApplebaumAB17,
  author    = {Benny Applebaum and
               Jonathan Avron and
               Chris Brzuska},
  title     = {Arithmetic Cryptography},
  journal   = {J. {ACM}},
  volume    = {64},
  number    = {2},
  pages     = {10:1--10:74},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3046675},
  doi       = {10.1145/3046675},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jacm/ApplebaumAB17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaJ17,
  author    = {Chris Brzuska and
               H{\aa}kon Jacobsen},
  title     = {A Modular Security Analysis of {EAP} and {IEEE} 802.11},
  booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  pages     = {335--365},
  year      = {2017},
  crossref  = {DBLP:conf/pkc/2017-2},
  url       = {https://doi.org/10.1007/978-3-662-54388-7_12},
  doi       = {10.1007/978-3-662-54388-7_12},
  timestamp = {Thu, 23 Nov 2017 13:00:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BrzuskaJ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaJ17,
  author    = {Chris Brzuska and
               H{\aa}kon Jacobsen},
  title     = {A Modular Security Analysis of {EAP} and {IEEE} 802.11},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {253},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/253},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaJ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiBF16,
  author    = {Zvika Brakerski and
               Christina Brzuska and
               Nils Fleischhacker},
  title     = {On Statistically Secure Obfuscation with Approximate Correctness},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  pages     = {551--578},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-53008-5_19},
  doi       = {10.1007/978-3-662-53008-5_19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BrakerskiBF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrzuskaJS16,
  author    = {Christina Brzuska and
               H{\aa}kon Jacobsen and
               Douglas Stebila},
  title     = {Safely Exporting Keys from Secure Channels - On the Security of {EAP-TLS}
               and {TLS} Key Exporters},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  pages     = {670--698},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-49890-3_26},
  doi       = {10.1007/978-3-662-49890-3_26},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/BrzuskaJS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BhargavanBF0KB16,
  author    = {Karthikeyan Bhargavan and
               Christina Brzuska and
               C{\'{e}}dric Fournet and
               Matthew Green and
               Markulf Kohlweiss and
               Santiago Zanella B{\'{e}}guelin},
  title     = {Downgrade Resilience in Key-Exchange Protocols},
  booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
               USA, May 22-26, 2016},
  pages     = {506--525},
  year      = {2016},
  crossref  = {DBLP:conf/sp/2016},
  url       = {https://doi.org/10.1109/SP.2016.37},
  doi       = {10.1109/SP.2016.37},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/BhargavanBF0KB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhargavanBFGKB16,
  author    = {Karthikeyan Bhargavan and
               Christina Brzuska and
               C{\'{e}}dric Fournet and
               Matthew Green and
               Markulf Kohlweiss and
               Santiago Zanella B{\'{e}}guelin},
  title     = {Downgrade Resilience in Key-Exchange Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {72},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/072},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BhargavanBFGKB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaJS16,
  author    = {Christina Brzuska and
               H{\aa}kon Jacobsen and
               Douglas Stebila},
  title     = {Safely Exporting Keys from Secure Channels: On the security of {EAP-TLS}
               and {TLS} Key Exporters},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {87},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/087},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaJS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiBF16,
  author    = {Zvika Brakerski and
               Christina Brzuska and
               Nils Fleischhacker},
  title     = {On Statistically Secure Obfuscation with Approximate Correctness},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {226},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/226},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrakerskiBF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ApplebaumAB15,
  author    = {Benny Applebaum and
               Jonathan Avron and
               Christina Brzuska},
  title     = {Arithmetic Cryptography: Extended Abstract},
  booktitle = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
               Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages     = {143--151},
  year      = {2015},
  crossref  = {DBLP:conf/innovations/2015},
  url       = {http://doi.acm.org/10.1145/2688073.2688114},
  doi       = {10.1145/2688073.2688114},
  timestamp = {Sun, 25 Jan 2015 11:29:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/ApplebaumAB15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BogdanovB15,
  author    = {Andrej Bogdanov and
               Christina Brzuska},
  title     = {On Basing Size-Verifiable One-Way Functions on NP-Hardness},
  booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  pages     = {1--6},
  year      = {2015},
  crossref  = {DBLP:conf/tcc/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-46494-6_1},
  doi       = {10.1007/978-3-662-46494-6_1},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/BogdanovB15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrzuskaFM15,
  author    = {Christina Brzuska and
               Pooya Farshim and
               Arno Mittelbach},
  title     = {Random-Oracle Uninstantiability from Indistinguishability Obfuscation},
  booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  pages     = {428--455},
  year      = {2015},
  crossref  = {DBLP:conf/tcc/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-46497-7_17},
  doi       = {10.1007/978-3-662-46497-7_17},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/BrzuskaFM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ApplebaumAB15,
  author    = {Benny Applebaum and
               Jonathan Avron and
               Christina Brzuska},
  title     = {Arithmetic Cryptography},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {22},
  pages     = {61},
  year      = {2015},
  url       = {http://eccc.hpi-web.de/report/2015/061},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/ApplebaumAB15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumAB15,
  author    = {Benny Applebaum and
               Jonathan Avron and
               Christina Brzuska},
  title     = {Arithmetic Cryptography},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {336},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/336},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ApplebaumAB15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaM15,
  author    = {Christina Brzuska and
               Arno Mittelbach},
  title     = {Universal Computational Extractors and the Superfluous Padding Assumption
               for Indistinguishability Obfuscation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {581},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/581},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrzuskaM14,
  author    = {Christina Brzuska and
               Arno Mittelbach},
  title     = {Using Indistinguishability Obfuscation via UCEs},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  pages     = {122--141},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-662-45608-8_7},
  doi       = {10.1007/978-3-662-45608-8_7},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BrzuskaM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrzuskaM14a,
  author    = {Christina Brzuska and
               Arno Mittelbach},
  title     = {Indistinguishability Obfuscation versus Multi-bit Point Obfuscation
               with Auxiliary Input},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  pages     = {142--161},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-662-45608-8_8},
  doi       = {10.1007/978-3-662-45608-8_8},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BrzuskaM14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrzuskaFM14,
  author    = {Christina Brzuska and
               Pooya Farshim and
               Arno Mittelbach},
  title     = {Indistinguishability Obfuscation and UCEs: The Case of Computationally
               Unpredictable Sources},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {188--205},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2_11},
  doi       = {10.1007/978-3-662-44371-2_11},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BrzuskaFM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BogdanovB14,
  author    = {Andrej Bogdanov and
               Christina Brzuska},
  title     = {On Basing Size-Verifiable One-Way Functions on NP-Hardness},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {21},
  pages     = {108},
  year      = {2014},
  url       = {http://eccc.hpi-web.de/report/2014/108},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/BogdanovB14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFM14,
  author    = {Christina Brzuska and
               Pooya Farshim and
               Arno Mittelbach},
  title     = {Indistinguishability Obfuscation and UCEs: The Case of Computationally
               Unpredictable Sources},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {99},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/099},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaFM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaM14,
  author    = {Christina Brzuska and
               Arno Mittelbach},
  title     = {Using Indistinguishability Obfuscation via UCEs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {381},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/381},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaM14a,
  author    = {Christina Brzuska and
               Arno Mittelbach},
  title     = {Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary
               Input},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {405},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/405},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaM14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFM14a,
  author    = {Christina Brzuska and
               Pooya Farshim and
               Arno Mittelbach},
  title     = {Random Oracle Uninstantiability from Indistinguishability Obfuscation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {867},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/867},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaFM14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Brzuska13,
  author    = {Christina Brzuska},
  title     = {On the foundations of key exchange},
  school    = {Darmstadt University of Technology, Germany},
  year      = {2013},
  url       = {http://tuprints.ulb.tu-darmstadt.de/3414/},
  urn       = {urn:nbn:de:tuda-tuprints-34147},
  timestamp = {Wed, 09 Nov 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/phd/dnb/Brzuska13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BrzuskaFSWW13,
  author    = {Christina Brzuska and
               Marc Fischlin and
               Nigel P. Smart and
               Bogdan Warinschi and
               Stephen C. Williams},
  title     = {Less is more: relaxed yet composable security notions for key exchange},
  journal   = {Int. J. Inf. Sec.},
  volume    = {12},
  number    = {4},
  pages     = {267--297},
  year      = {2013},
  url       = {https://doi.org/10.1007/s10207-013-0192-y},
  doi       = {10.1007/s10207-013-0192-y},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/BrzuskaFSWW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaecherBM13,
  author    = {Paul Baecher and
               Christina Brzuska and
               Arno Mittelbach},
  title     = {Reset Indifferentiability and Its Consequences},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  pages     = {154--173},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-42033-7_9},
  doi       = {10.1007/978-3-642-42033-7_9},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BaecherBM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaecherBF13,
  author    = {Paul Baecher and
               Christina Brzuska and
               Marc Fischlin},
  title     = {Notions of Black-Box Reductions, Revisited},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  pages     = {296--315},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-42033-7_16},
  doi       = {10.1007/978-3-642-42033-7_16},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BaecherBF13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrzuskaSWW13,
  author    = {Christina Brzuska and
               Nigel P. Smart and
               Bogdan Warinschi and
               Gaven J. Watson},
  title     = {An analysis of the {EMV} channel establishment protocol},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {373--386},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {http://doi.acm.org/10.1145/2508859.2516748},
  doi       = {10.1145/2508859.2516748},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BrzuskaSWW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/BrzuskaPS13,
  author    = {Christina Brzuska and
               Henrich Christopher P{\"{o}}hls and
               Kai Samelin},
  title     = {Efficient and Perfectly Unlinkable Sanitizable Signatures without
               Group Signatures},
  booktitle = {Public Key Infrastructures, Services and Applications - 10th European
               Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised
               Selected Papers},
  pages     = {12--30},
  year      = {2013},
  crossref  = {DBLP:conf/europki/2013},
  url       = {https://doi.org/10.1007/978-3-642-53997-8_2},
  doi       = {10.1007/978-3-642-53997-8_2},
  timestamp = {Fri, 02 Jun 2017 20:48:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/BrzuskaPS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaSWW13,
  author    = {Christina Brzuska and
               Nigel P. Smart and
               Bogdan Warinschi and
               Gaven J. Watson},
  title     = {An Analysis of the {EMV} Channel Establishment Protocol},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {31},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/031},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaSWW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaecherBF13,
  author    = {Paul Baecher and
               Christina Brzuska and
               Marc Fischlin},
  title     = {Notions of Black-Box Reductions, Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {101},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/101},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaecherBF13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaecherBM13,
  author    = {Paul Baecher and
               Christina Brzuska and
               Arno Mittelbach},
  title     = {Reset Indifferentiability and its Consequences},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {459},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/459},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaecherBM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/BrzuskaPS12,
  author    = {Christina Brzuska and
               Henrich Christopher P{\"{o}}hls and
               Kai Samelin},
  title     = {Non-interactive Public Accountability for Sanitizable Signatures},
  booktitle = {Public Key Infrastructures, Services and Applications - 9th European
               Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised
               Selected Papers},
  pages     = {178--193},
  year      = {2012},
  crossref  = {DBLP:conf/europki/2012},
  url       = {https://doi.org/10.1007/978-3-642-40012-4_12},
  doi       = {10.1007/978-3-642-40012-4_12},
  timestamp = {Fri, 02 Jun 2017 20:48:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/BrzuskaPS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BrzuskaDF12,
  author    = {Christina Brzuska and
               {\"{O}}zg{\"{u}}r Dagdelen and
               Marc Fischlin},
  title     = {TLS, PACE, and {EAC:} ACryptographic View at Modern Key Exchange Protocols},
  booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
               Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
               der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
               2012 in Darmstadt},
  pages     = {71--82},
  year      = {2012},
  crossref  = {DBLP:conf/sicherheit/2012},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings195/article6598.html},
  timestamp = {Fri, 09 Dec 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sicherheit/BrzuskaDF12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFSWW12,
  author    = {Christina Brzuska and
               Marc Fischlin and
               Nigel P. Smart and
               Bogdan Warinschi and
               Stephen C. Williams},
  title     = {Less is More: Relaxed yet Composable Security Notions for Key Exchange},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {242},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/242},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaFSWW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrzuskaFWW11,
  author    = {Christina Brzuska and
               Marc Fischlin and
               Bogdan Warinschi and
               Stephen C. Williams},
  title     = {Composability of bellare-rogaway key exchange protocols},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {51--62},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011},
  url       = {http://doi.acm.org/10.1145/2046707.2046716},
  doi       = {10.1145/2046707.2046716},
  timestamp = {Thu, 20 Oct 2011 19:38:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BrzuskaFWW11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrzuskaFSK11,
  author    = {Christina Brzuska and
               Marc Fischlin and
               Heike Schr{\"{o}}der and
               Stefan Katzenbeisser},
  title     = {Physically Uncloneable Functions in the Universal Composition Framework},
  booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  pages     = {51--70},
  year      = {2011},
  crossref  = {DBLP:conf/crypto/2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9_4},
  doi       = {10.1007/978-3-642-22792-9_4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BrzuskaFSK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFSK11,
  author    = {Christina Brzuska and
               Marc Fischlin and
               Heike Schr{\"{o}}der and
               Stefan Katzenbeisser},
  title     = {Physically Uncloneable Functions in the Universal Composition Framework},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {681},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/681},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrzuskaFSK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BrzuskaBDFFKMOPPS10,
  author    = {Christina Brzuska and
               Heike Busch and
               {\"{O}}zg{\"{u}}r Dagdelen and
               Marc Fischlin and
               Martin Franz and
               Stefan Katzenbeisser and
               Mark Manulis and
               Cristina Onete and
               Andreas Peter and
               Bertram Poettering and
               Dominique Schr{\"{o}}der},
  title     = {Redactable Signatures for Tree-Structured Data: Definitions and Constructions},
  booktitle = {Applied Cryptography and Network Security, 8th International Conference,
               {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  pages     = {87--104},
  year      = {2010},
  crossref  = {DBLP:conf/acns/2010},
  url       = {https://doi.org/10.1007/978-3-642-13708-2_6},
  doi       = {10.1007/978-3-642-13708-2_6},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/BrzuskaBDFFKMOPPS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaFLS10,
  author    = {Christina Brzuska and
               Marc Fischlin and
               Anja Lehmann and
               Dominique Schr{\"{o}}der},
  title     = {Unlinkability of Sanitizable Signatures},
  booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  pages     = {444--461},
  year      = {2010},
  crossref  = {DBLP:conf/pkc/2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7_26},
  doi       = {10.1007/978-3-642-13013-7_26},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BrzuskaFLS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/BrzuskaFLS09,
  author    = {Christina Brzuska and
               Marc Fischlin and
               Anja Lehmann and
               Dominique Schr{\"{o}}der},
  title     = {Santizable Signatures: How to Partially Delegate Control for Authenticated
               Data},
  booktitle = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics
               and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany},
  pages     = {117--128},
  year      = {2009},
  crossref  = {DBLP:conf/biosig/2009},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings155/article2927.html},
  timestamp = {Thu, 30 Sep 2010 13:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/biosig/BrzuskaFLS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaFFLPSSV09,
  author    = {Christina Brzuska and
               Marc Fischlin and
               Tobias Freudenreich and
               Anja Lehmann and
               Marcus Page and
               Jakob Schelbert and
               Dominique Schr{\"{o}}der and
               Florian Volk},
  title     = {Security of Sanitizable Signatures Revisited},
  booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  pages     = {317--336},
  year      = {2009},
  crossref  = {DBLP:conf/pkc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1_18},
  doi       = {10.1007/978-3-642-00468-1_18},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BrzuskaFFLPSSV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2018,
  editor    = {Bart Preneel and
               Frederik Vercauteren},
  title     = {Applied Cryptography and Network Security - 16th International Conference,
               {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10892},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93387-0},
  doi       = {10.1007/978-3-319-93387-0},
  isbn      = {978-3-319-93386-3},
  timestamp = {Wed, 13 Jun 2018 13:59:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2017-2,
  editor    = {Serge Fehr},
  title     = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10175},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54388-7},
  doi       = {10.1007/978-3-662-54388-7},
  isbn      = {978-3-662-54387-0},
  timestamp = {Thu, 23 Nov 2017 13:00:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-2,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9815},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53008-5},
  doi       = {10.1007/978-3-662-53008-5},
  isbn      = {978-3-662-53007-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-1,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9665},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49890-3},
  doi       = {10.1007/978-3-662-49890-3},
  isbn      = {978-3-662-49889-7},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2016,
  title     = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
               USA, May 22-26, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7528194},
  isbn      = {978-1-5090-0824-7},
  timestamp = {Tue, 20 Sep 2016 12:04:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2015,
  editor    = {Tim Roughgarden},
  title     = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
               Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2688073},
  isbn      = {978-1-4503-3333-7},
  timestamp = {Sun, 25 Jan 2015 11:29:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2015-1,
  editor    = {Yevgeniy Dodis and
               Jesper Buus Nielsen},
  title     = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9014},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46494-6},
  doi       = {10.1007/978-3-662-46494-6},
  isbn      = {978-3-662-46493-9},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2015-2,
  editor    = {Yevgeniy Dodis and
               Jesper Buus Nielsen},
  title     = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9015},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46497-7},
  doi       = {10.1007/978-3-662-46497-7},
  isbn      = {978-3-662-46496-0},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8874},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45608-8},
  doi       = {10.1007/978-3-662-45608-8},
  isbn      = {978-3-662-45607-1},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-1,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8269},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42033-7},
  doi       = {10.1007/978-3-642-42033-7},
  isbn      = {978-3-642-42032-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2013-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn      = {978-1-4503-2477-9},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2013,
  editor    = {Sokratis K. Katsikas and
               Isaac Agudo},
  title     = {Public Key Infrastructures, Services and Applications - 10th European
               Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8341},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-53997-8},
  doi       = {10.1007/978-3-642-53997-8},
  isbn      = {978-3-642-53996-1},
  timestamp = {Fri, 02 Jun 2017 20:48:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2012,
  editor    = {Sabrina De Capitani di Vimercati and
               Chris J. Mitchell},
  title     = {Public Key Infrastructures, Services and Applications - 9th European
               Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7868},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40012-4},
  doi       = {10.1007/978-3-642-40012-4},
  isbn      = {978-3-642-40011-7},
  timestamp = {Fri, 02 Jun 2017 20:48:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2012,
  editor    = {Neeraj Suri and
               Michael Waidner},
  title     = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
               Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
               der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
               2012 in Darmstadt},
  series    = {{LNI}},
  volume    = {195},
  publisher = {{GI}},
  year      = {2012},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings195.html},
  isbn      = {978-3-88579-289-5},
  timestamp = {Tue, 15 Mar 2016 11:26:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sicherheit/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011,
  editor    = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0948-6},
  timestamp = {Thu, 20 Oct 2011 19:38:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2011,
  editor    = {Phillip Rogaway},
  title     = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6841},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9},
  doi       = {10.1007/978-3-642-22792-9},
  isbn      = {978-3-642-22791-2},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2010,
  editor    = {Jianying Zhou and
               Moti Yung},
  title     = {Applied Cryptography and Network Security, 8th International Conference,
               {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6123},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13708-2},
  doi       = {10.1007/978-3-642-13708-2},
  isbn      = {978-3-642-13707-5},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2010,
  editor    = {Phong Q. Nguyen and
               David Pointcheval},
  title     = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6056},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7},
  doi       = {10.1007/978-3-642-13013-7},
  isbn      = {978-3-642-13012-0},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/biosig/2009,
  editor    = {Arslan Br{\"{o}}mme and
               Christoph Busch and
               Detlef H{\"{u}}hnlein},
  title     = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics
               and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany},
  series    = {{LNI}},
  volume    = {155},
  publisher = {{GI}},
  year      = {2009},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings155/P-155.pdf},
  isbn      = {978-3-88579-249-9},
  timestamp = {Thu, 30 Sep 2010 13:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/biosig/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2009,
  editor    = {Stanislaw Jarecki and
               Gene Tsudik},
  title     = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5443},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1},
  doi       = {10.1007/978-3-642-00468-1},
  isbn      = {978-3-642-00467-4},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier