BibTeX records: Daniel Genkin

download as .bib file

@article{DBLP:journals/jce/YaromGH17,
  author    = {Yuval Yarom and
               Daniel Genkin and
               Nadia Heninger},
  title     = {CacheBleed: a timing attack on OpenSSL constant-time {RSA}},
  journal   = {J. Cryptographic Engineering},
  volume    = {7},
  number    = {2},
  pages     = {99--112},
  year      = {2017},
  url       = {https://doi.org/10.1007/s13389-017-0152-y},
  doi       = {10.1007/s13389-017-0152-y},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jce/YaromGH17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/GenkinST17,
  author    = {Daniel Genkin and
               Adi Shamir and
               Eran Tromer},
  title     = {Acoustic Cryptanalysis},
  journal   = {J. Cryptology},
  volume    = {30},
  number    = {2},
  pages     = {392--443},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00145-015-9224-2},
  doi       = {10.1007/s00145-015-9224-2},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/GenkinST17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Ben-SassonBCGGH17,
  author    = {Eli Ben{-}Sasson and
               Iddo Bentov and
               Alessandro Chiesa and
               Ariel Gabizon and
               Daniel Genkin and
               Matan Hamilis and
               Evgenya Pergament and
               Michael Riabzev and
               Mark Silberstein and
               Eran Tromer and
               Madars Virza},
  title     = {Computational Integrity with a Public Random String from Quasi-Linear
               PCPs},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  pages     = {551--579},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-3},
  url       = {https://doi.org/10.1007/978-3-319-56617-7_19},
  doi       = {10.1007/978-3-319-56617-7_19},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/Ben-SassonBCGGH17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/GenkinPST16,
  author    = {Daniel Genkin and
               Lev Pachmanov and
               Itamar Pipman and
               Adi Shamir and
               Eran Tromer},
  title     = {Physical key extraction attacks on PCs},
  journal   = {Commun. {ACM}},
  volume    = {59},
  number    = {6},
  pages     = {70--79},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2851486},
  doi       = {10.1145/2851486},
  timestamp = {Mon, 30 May 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/GenkinPST16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPPT16,
  author    = {Daniel Genkin and
               Lev Pachmanov and
               Itamar Pipman and
               Eran Tromer},
  title     = {{ECDH} Key-Extraction via Low-Bandwidth Electromagnetic Attacks on
               PCs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {129},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/129},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GenkinPPT16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/YaromGH16,
  author    = {Yuval Yarom and
               Daniel Genkin and
               Nadia Heninger},
  title     = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {224},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/224},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/YaromGH16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPPTY16,
  author    = {Daniel Genkin and
               Lev Pachmanov and
               Itamar Pipman and
               Eran Tromer and
               Yuval Yarom},
  title     = {{ECDSA} Key Extraction from Mobile Devices via Nonintrusive Physical
               Side Channels},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {230},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/230},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GenkinPPTY16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonBCGGH16,
  author    = {Eli Ben{-}Sasson and
               Iddo Bentov and
               Alessandro Chiesa and
               Ariel Gabizon and
               Daniel Genkin and
               Matan Hamilis and
               Evgenya Pergament and
               Michael Riabzev and
               Mark Silberstein and
               Eran Tromer and
               Madars Virza},
  title     = {Computational integrity with a public random string from quasi-linear
               PCPs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {646},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/646},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Ben-SassonBCGGH16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIW16,
  author    = {Daniel Genkin and
               Yuval Ishai and
               Mor Weiss},
  title     = {Binary {AMD} Circuits from Secure Multiparty Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {809},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/809},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GenkinIW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GenkinPPTY16,
  author    = {Daniel Genkin and
               Lev Pachmanov and
               Itamar Pipman and
               Eran Tromer and
               Yuval Yarom},
  title     = {{ECDSA} Key Extraction from Mobile Devices via Nonintrusive Physical
               Side Channels},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1626--1638},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {http://doi.acm.org/10.1145/2976749.2978353},
  doi       = {10.1145/2976749.2978353},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/GenkinPPTY16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/YaromGH16,
  author    = {Yuval Yarom and
               Daniel Genkin and
               Nadia Heninger},
  title     = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
               Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  pages     = {346--367},
  year      = {2016},
  crossref  = {DBLP:conf/ches/2016},
  url       = {https://doi.org/10.1007/978-3-662-53140-2_17},
  doi       = {10.1007/978-3-662-53140-2_17},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/YaromGH16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GenkinPPT16,
  author    = {Daniel Genkin and
               Lev Pachmanov and
               Itamar Pipman and
               Eran Tromer},
  title     = {{ECDH} Key-Extraction via Low-Bandwidth Electromagnetic Attacks on
               PCs},
  booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  pages     = {219--235},
  year      = {2016},
  crossref  = {DBLP:conf/ctrsa/2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8_13},
  doi       = {10.1007/978-3-319-29485-8_13},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/GenkinPPT16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GenkinIW16,
  author    = {Daniel Genkin and
               Yuval Ishai and
               Mor Weiss},
  title     = {Binary {AMD} Circuits from Secure Multiparty Computation},
  booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  pages     = {336--366},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016b1},
  url       = {https://doi.org/10.1007/978-3-662-53641-4_14},
  doi       = {10.1007/978-3-662-53641-4_14},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/GenkinIW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIPST15,
  author    = {Daniel Genkin and
               Yuval Ishai and
               Manoj Prabhakaran and
               Amit Sahai and
               Eran Tromer},
  title     = {Circuits Resilient to Additive Attacks with Applications to Secure
               Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {154},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/154},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GenkinIPST15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPPT15,
  author    = {Daniel Genkin and
               Lev Pachmanov and
               Itamar Pipman and
               Eran Tromer},
  title     = {Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks
               on Windowed Exponentiation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {170},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/170},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GenkinPPT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jce/GenkinPT15,
  author    = {Daniel Genkin and
               Itamar Pipman and
               Eran Tromer},
  title     = {Get your hands off my laptop: physical side-channel key-extraction
               attacks on PCs - Extended version},
  journal   = {J. Cryptographic Engineering},
  volume    = {5},
  number    = {2},
  pages     = {95--112},
  year      = {2015},
  url       = {https://doi.org/10.1007/s13389-015-0100-7},
  doi       = {10.1007/s13389-015-0100-7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jce/GenkinPT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/GenkinPPT15,
  author    = {Daniel Genkin and
               Lev Pachmanov and
               Itamar Pipman and
               Eran Tromer},
  title     = {Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks
               on Windowed Exponentiation},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
               Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  pages     = {207--228},
  year      = {2015},
  crossref  = {DBLP:conf/ches/2015},
  url       = {https://doi.org/10.1007/978-3-662-48324-4_11},
  doi       = {10.1007/978-3-662-48324-4_11},
  timestamp = {Thu, 15 Jun 2017 21:37:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/GenkinPPT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GenkinIP15,
  author    = {Daniel Genkin and
               Yuval Ishai and
               Antigoni Polychroniadou},
  title     = {Efficient Multi-party Computation: From Passive to Active Security
               via Secure {SIMD} Circuits},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  pages     = {721--741},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48000-7_35},
  doi       = {10.1007/978-3-662-48000-7_35},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/GenkinIP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPT14a,
  author    = {Daniel Genkin and
               Itamar Pipman and
               Eran Tromer},
  title     = {Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction
               Attacks on PCs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {626},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/626},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GenkinPT14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcs/GenkinKP14,
  author    = {Daniel Genkin and
               Michael Kaminski and
               Liat Peterfreund},
  title     = {A note on the emptiness problem for alternating finite-memory automata},
  journal   = {Theor. Comput. Sci.},
  volume    = {526},
  pages     = {97--107},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.tcs.2014.01.020},
  doi       = {10.1016/j.tcs.2014.01.020},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcs/GenkinKP14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/GenkinPT14,
  author    = {Daniel Genkin and
               Itamar Pipman and
               Eran Tromer},
  title     = {Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction
               Attacks on PCs},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
               Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  pages     = {242--260},
  year      = {2014},
  crossref  = {DBLP:conf/ches/2014},
  url       = {https://doi.org/10.1007/978-3-662-44709-3_14},
  doi       = {10.1007/978-3-662-44709-3_14},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/GenkinPT14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GenkinST14,
  author    = {Daniel Genkin and
               Adi Shamir and
               Eran Tromer},
  title     = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {444--461},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2_25},
  doi       = {10.1007/978-3-662-44371-2_25},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/GenkinST14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GenkinIPST14,
  author    = {Daniel Genkin and
               Yuval Ishai and
               Manoj Prabhakaran and
               Amit Sahai and
               Eran Tromer},
  title     = {Circuits resilient to additive attacks with applications to secure
               computation},
  booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
               May 31 - June 03, 2014},
  pages     = {495--504},
  year      = {2014},
  crossref  = {DBLP:conf/stoc/2014},
  url       = {http://doi.acm.org/10.1145/2591796.2591861},
  doi       = {10.1145/2591796.2591861},
  timestamp = {Wed, 29 Mar 2017 16:45:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/GenkinIPST14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCGTV13,
  author    = {Eli Ben{-}Sasson and
               Alessandro Chiesa and
               Daniel Genkin and
               Eran Tromer and
               Madars Virza},
  title     = {SNARKs for {C:} Verifying Program Executions Succinctly and in Zero
               Knowledge},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {507},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/507},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Ben-SassonCGTV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GenkinST13,
  author    = {Daniel Genkin and
               Adi Shamir and
               Eran Tromer},
  title     = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {857},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/857},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GenkinST13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-SassonCGTV13,
  author    = {Eli Ben{-}Sasson and
               Alessandro Chiesa and
               Daniel Genkin and
               Eran Tromer and
               Madars Virza},
  title     = {SNARKs for {C:} Verifying Program Executions Succinctly and in Zero
               Knowledge},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  pages     = {90--108},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-40084-1_6},
  doi       = {10.1007/978-3-642-40084-1_6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/Ben-SassonCGTV13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Ben-SassonCGT13,
  author    = {Eli Ben{-}Sasson and
               Alessandro Chiesa and
               Daniel Genkin and
               Eran Tromer},
  title     = {Fast reductions from RAMs to delegatable succinct constraint satisfaction
               problems: extended abstract},
  booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
               CA, USA, January 9-12, 2013},
  pages     = {401--414},
  year      = {2013},
  crossref  = {DBLP:conf/innovations/2013},
  url       = {http://doi.acm.org/10.1145/2422436.2422481},
  doi       = {10.1145/2422436.2422481},
  timestamp = {Sun, 17 Feb 2013 11:19:02 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/innovations/Ben-SassonCGT13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Ben-SassonCGT13,
  author    = {Eli Ben{-}Sasson and
               Alessandro Chiesa and
               Daniel Genkin and
               Eran Tromer},
  title     = {On the concrete efficiency of probabilistically-checkable proofs},
  booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  pages     = {585--594},
  year      = {2013},
  crossref  = {DBLP:conf/stoc/2013},
  url       = {http://doi.acm.org/10.1145/2488608.2488681},
  doi       = {10.1145/2488608.2488681},
  timestamp = {Sun, 26 May 2013 10:30:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/Ben-SassonCGT13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/Ben-SassonCGT12,
  author    = {Eli Ben{-}Sasson and
               Alessandro Chiesa and
               Daniel Genkin and
               Eran Tromer},
  title     = {On the Concrete-Efficiency Threshold of Probabilistically-Checkable
               Proofs},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {19},
  pages     = {45},
  year      = {2012},
  url       = {http://eccc.hpi-web.de/report/2012/045},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/eccc/Ben-SassonCGT12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCGT12,
  author    = {Eli Ben{-}Sasson and
               Alessandro Chiesa and
               Daniel Genkin and
               Eran Tromer},
  title     = {Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction
               Problems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {71},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/071},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Ben-SassonCGT12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sLogica/AizikowitzFGK10,
  author    = {Tamar Aizikowitz and
               Nissim Francez and
               Daniel Genkin and
               Michael Kaminski},
  title     = {Extending Free Pregroups with Lower Bounds},
  journal   = {Studia Logica},
  volume    = {95},
  number    = {3},
  pages     = {417--441},
  year      = {2010},
  url       = {https://doi.org/10.1007/s11225-010-9264-4},
  doi       = {10.1007/s11225-010-9264-4},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/sLogica/AizikowitzFGK10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/birthday/GenkinFK10,
  author    = {Daniel Genkin and
               Nissim Francez and
               Michael Kaminski},
  title     = {Mildly Context-Sensitive Languages via Buffer Augmented Pregroup Grammars},
  booktitle = {Time for Verification, Essays in Memory of Amir Pnueli},
  pages     = {144--166},
  year      = {2010},
  crossref  = {DBLP:conf/birthday/2010pnueli},
  url       = {https://doi.org/10.1007/978-3-642-13754-9_7},
  doi       = {10.1007/978-3-642-13754-9_7},
  timestamp = {Tue, 23 May 2017 01:06:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/birthday/GenkinFK10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-3,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10212},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56617-7},
  doi       = {10.1007/978-3-319-56617-7},
  isbn      = {978-3-319-56616-0},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2017-3},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2016,
  editor    = {Benedikt Gierlichs and
               Axel Y. Poschmann},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
               Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9813},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53140-2},
  doi       = {10.1007/978-3-662-53140-2},
  isbn      = {978-3-662-53139-6},
  timestamp = {Sun, 21 May 2017 00:18:34 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2016,
  editor    = {Kazue Sako},
  title     = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9610},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8},
  doi       = {10.1007/978-3-319-29485-8},
  isbn      = {978-3-319-29484-1},
  timestamp = {Sun, 21 May 2017 00:20:21 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b1,
  editor    = {Martin Hirt and
               Adam D. Smith},
  title     = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9985},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53641-4},
  doi       = {10.1007/978-3-662-53641-4},
  isbn      = {978-3-662-53640-7},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2016b1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2015,
  editor    = {Tim G{\"{u}}neysu and
               Helena Handschuh},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
               Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9293},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48324-4},
  doi       = {10.1007/978-3-662-48324-4},
  isbn      = {978-3-662-48323-7},
  timestamp = {Thu, 15 Jun 2017 21:37:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9216},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48000-7},
  doi       = {10.1007/978-3-662-48000-7},
  isbn      = {978-3-662-47999-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2015-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2014,
  editor    = {Lejla Batina and
               Matthew Robshaw},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
               Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8731},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44709-3},
  doi       = {10.1007/978-3-662-44709-3},
  isbn      = {978-3-662-44708-6},
  timestamp = {Sun, 21 May 2017 00:18:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2014,
  editor    = {David B. Shmoys},
  title     = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
               May 31 - June 03, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2591796},
  isbn      = {978-1-4503-2710-7},
  timestamp = {Wed, 29 Mar 2017 16:45:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-2,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8043},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40084-1},
  doi       = {10.1007/978-3-642-40084-1},
  isbn      = {978-3-642-40083-4},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2013-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2013,
  editor    = {Robert D. Kleinberg},
  title     = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
               CA, USA, January 9-12, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2422436},
  isbn      = {978-1-4503-1859-4},
  timestamp = {Sun, 17 Feb 2013 11:19:02 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/innovations/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2013,
  editor    = {Dan Boneh and
               Tim Roughgarden and
               Joan Feigenbaum},
  title     = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2488608},
  isbn      = {978-1-4503-2029-0},
  timestamp = {Sun, 26 May 2013 10:30:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/birthday/2010pnueli,
  editor    = {Zohar Manna and
               Doron A. Peled},
  title     = {Time for Verification, Essays in Memory of Amir Pnueli},
  series    = {Lecture Notes in Computer Science},
  volume    = {6200},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13754-9},
  doi       = {10.1007/978-3-642-13754-9},
  isbn      = {978-3-642-13753-2},
  timestamp = {Tue, 23 May 2017 01:06:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/birthday/2010pnueli},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier