BibTeX records: Kazuhiko Minematsu

download as .bib file

@article{DBLP:journals/iacr/MinematsuI17,
  author    = {Kazuhiko Minematsu and
               Tetsu Iwata},
  title     = {Cryptanalysis of PMACx, PMAC2x, and SIVx},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {220},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/220},
  timestamp = {Tue, 21 Mar 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/MinematsuI17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tosc/IwataM16,
  author    = {Tetsu Iwata and
               Kazuhiko Minematsu},
  title     = {Stronger Security Variants of {GCM-SIV}},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2016},
  number    = {1},
  pages     = {134--157},
  year      = {2016},
  url       = {http://tosc.iacr.org/index.php/ToSC/article/view/539},
  timestamp = {Wed, 25 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tosc/IwataM16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Minematsu16,
  author    = {Kazuhiko Minematsu},
  title     = {Authenticated Encryption with Small Stretch (or, How to Accelerate
               {AERO)}},
  booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  pages     = {347--362},
  year      = {2016},
  crossref  = {DBLP:conf/acisp/2016-2},
  url       = {http://dx.doi.org/10.1007/978-3-319-40367-0_22},
  doi       = {10.1007/978-3-319-40367-0_22},
  timestamp = {Fri, 08 Jul 2016 11:27:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/Minematsu16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/host/BanikBM16,
  author    = {Subhadeep Banik and
               Andrey Bogdanov and
               Kazuhiko Minematsu},
  title     = {Low-area hardware implementations of CLOC, {SILC} and {AES-OTR}},
  booktitle = {2016 {IEEE} International Symposium on Hardware Oriented Security
               and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016},
  pages     = {71--74},
  year      = {2016},
  crossref  = {DBLP:conf/host/2016},
  url       = {http://dx.doi.org/10.1109/HST.2016.7495559},
  doi       = {10.1109/HST.2016.7495559},
  timestamp = {Tue, 28 Jun 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/host/BanikBM16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ImamuraMI16,
  author    = {Kazuya Imamura and
               Kazuhiko Minematsu and
               Tetsu Iwata},
  title     = {Integrity Analysis of Authenticated Encryption Based on Stream Ciphers},
  booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
               China, November 10-11, 2016, Proceedings},
  pages     = {257--276},
  year      = {2016},
  crossref  = {DBLP:conf/provsec/2016},
  url       = {http://dx.doi.org/10.1007/978-3-319-47422-9_15},
  doi       = {10.1007/978-3-319-47422-9_15},
  timestamp = {Thu, 03 Nov 2016 13:47:47 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/provsec/ImamuraMI16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/IwataM16,
  author    = {Tetsu Iwata and
               Kazuhiko Minematsu},
  title     = {Stronger Security Variants of {GCM-SIV}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {853},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/853},
  timestamp = {Fri, 14 Oct 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/IwataM16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ImamuraMI16,
  author    = {Kazuya Imamura and
               Kazuhiko Minematsu and
               Tetsu Iwata},
  title     = {Integrity Analysis of Authenticated Encryption Based on Stream Ciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1124},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1124},
  timestamp = {Thu, 15 Dec 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/ImamuraMI16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/Minematsu15,
  author    = {Kazuhiko Minematsu},
  title     = {Building blockcipher from small-block tweakable blockcipher},
  journal   = {Des. Codes Cryptography},
  volume    = {74},
  number    = {3},
  pages     = {645--663},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/s10623-013-9882-8},
  doi       = {10.1007/s10623-013-9882-8},
  timestamp = {Thu, 19 Feb 2015 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dcc/Minematsu15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/KobayashiMI15,
  author    = {Hayato Kobayashi and
               Kazuhiko Minematsu and
               Tetsu Iwata},
  title     = {Optimality of Tweak Functions in {CLOC}},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {10},
  pages     = {2152--2164},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_10_2152},
  timestamp = {Fri, 02 Oct 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/KobayashiMI15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Minematsu15,
  author    = {Kazuhiko Minematsu},
  title     = {Efficient Message Authentication Codes with Combinatorial Group Testing},
  booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {I}},
  pages     = {185--202},
  year      = {2015},
  crossref  = {DBLP:conf/esorics/2015-1},
  url       = {http://dx.doi.org/10.1007/978-3-319-24174-6_10},
  doi       = {10.1007/978-3-319-24174-6_10},
  timestamp = {Mon, 12 Oct 2015 13:35:11 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/Minematsu15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/NiwaOMI15,
  author    = {Yuichi Niwa and
               Keisuke Ohashi and
               Kazuhiko Minematsu and
               Tetsu Iwata},
  title     = {{GCM} Security Bounds Reconsidered},
  booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
               Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  pages     = {385--407},
  year      = {2015},
  crossref  = {DBLP:conf/fse/2015},
  url       = {http://dx.doi.org/10.1007/978-3-662-48116-5_19},
  doi       = {10.1007/978-3-662-48116-5_19},
  timestamp = {Wed, 12 Aug 2015 12:56:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/NiwaOMI15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ima/MinematsuI15,
  author    = {Kazuhiko Minematsu and
               Tetsu Iwata},
  title     = {Tweak-Length Extension for Tweakable Blockciphers},
  booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
               2015, Oxford, UK, December 15-17, 2015. Proceedings},
  pages     = {77--93},
  year      = {2015},
  crossref  = {DBLP:conf/ima/2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-27239-9_5},
  doi       = {10.1007/978-3-319-27239-9_5},
  timestamp = {Tue, 08 Dec 2015 12:05:30 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ima/MinematsuI15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NiwaOMI15,
  author    = {Yuichi Niwa and
               Keisuke Ohashi and
               Kazuhiko Minematsu and
               Tetsu Iwata},
  title     = {{GCM} Security Bounds Reconsidered},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {214},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/214},
  timestamp = {Fri, 20 Mar 2015 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/NiwaOMI15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Minematsu15,
  author    = {Kazuhiko Minematsu},
  title     = {Authenticated Encryption without Tag Expansion (or, How to Accelerate
               {AERO)}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {738},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/738},
  timestamp = {Tue, 28 Jul 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Minematsu15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuI15,
  author    = {Kazuhiko Minematsu and
               Tetsu Iwata},
  title     = {Tweak-Length Extension for Tweakable Blockciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {888},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/888},
  timestamp = {Wed, 30 Sep 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/MinematsuI15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/date/YamashitaMOT14,
  author    = {Noritaka Yamashita and
               Kazuhiko Minematsu and
               Toshihiko Okamura and
               Yukiyasu Tsunoo},
  title     = {A smaller and faster variant of {RSM}},
  booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
               {DATE} 2014, Dresden, Germany, March 24-28, 2014},
  pages     = {1--6},
  year      = {2014},
  crossref  = {DBLP:conf/date/2014},
  url       = {http://dx.doi.org/10.7873/DATE.2014.218},
  doi       = {10.7873/DATE.2014.218},
  timestamp = {Tue, 10 Nov 2015 12:54:15 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/date/YamashitaMOT14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Minematsu14,
  author    = {Kazuhiko Minematsu},
  title     = {Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  pages     = {275--292},
  year      = {2014},
  crossref  = {DBLP:conf/eurocrypt/2014},
  url       = {http://dx.doi.org/10.1007/978-3-642-55220-5_16},
  doi       = {10.1007/978-3-642-55220-5_16},
  timestamp = {Fri, 02 May 2014 13:36:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/Minematsu14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataM0M14,
  author    = {Tetsu Iwata and
               Kazuhiko Minematsu and
               Jian Guo and
               Sumio Morioka},
  title     = {{CLOC:} Authenticated Encryption for Short Input},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  pages     = {149--167},
  year      = {2014},
  crossref  = {DBLP:conf/fse/2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-46706-0_8},
  doi       = {10.1007/978-3-662-46706-0_8},
  timestamp = {Wed, 22 Apr 2015 15:40:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/IwataM0M14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/IwataMGM14,
  author    = {Tetsu Iwata and
               Kazuhiko Minematsu and
               Jian Guo and
               Sumio Morioka},
  title     = {{CLOC:} Authenticated Encryption for Short Input},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {157},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/157},
  timestamp = {Tue, 07 Oct 2014 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/IwataMGM14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinematsuLMI13,
  author    = {Kazuhiko Minematsu and
               Stefan Lucks and
               Hiraku Morita and
               Tetsu Iwata},
  title     = {Attacks and Security Proofs of EAX-Prime},
  booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
               Singapore, March 11-13, 2013. Revised Selected Papers},
  pages     = {327--347},
  year      = {2013},
  crossref  = {DBLP:conf/fse/2013},
  url       = {http://dx.doi.org/10.1007/978-3-662-43933-3_17},
  doi       = {10.1007/978-3-662-43933-3_17},
  timestamp = {Tue, 08 Jul 2014 12:20:37 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/MinematsuLMI13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/provsec/MinematsuLI13,
  author    = {Kazuhiko Minematsu and
               Stefan Lucks and
               Tetsu Iwata},
  title     = {Improved Authenticity Bound of EAX, and Refinements},
  booktitle = {Provable Security - 7th International Conference, ProvSec 2013, Melaka,
               Malaysia, October 23-25, 2013. Proceedings},
  pages     = {184--201},
  year      = {2013},
  crossref  = {DBLP:conf/provsec/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-41227-1_11},
  doi       = {10.1007/978-3-642-41227-1_11},
  timestamp = {Thu, 21 Nov 2013 11:34:07 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/provsec/MinematsuLI13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Minematsu13,
  author    = {Kazuhiko Minematsu},
  title     = {A Short Universal Hash Function from Bit Rotation, and Applications
               to Blockcipher Modes},
  booktitle = {Provable Security - 7th International Conference, ProvSec 2013, Melaka,
               Malaysia, October 23-25, 2013. Proceedings},
  pages     = {221--238},
  year      = {2013},
  crossref  = {DBLP:conf/provsec/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-41227-1_13},
  doi       = {10.1007/978-3-642-41227-1_13},
  timestamp = {Thu, 21 Nov 2013 11:34:07 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/provsec/Minematsu13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Minematsu13,
  author    = {Kazuhiko Minematsu},
  title     = {Parallelizable Authenticated Encryption from Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {628},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/628},
  timestamp = {Sun, 20 Oct 2013 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Minematsu13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuLI13,
  author    = {Kazuhiko Minematsu and
               Stefan Lucks and
               Tetsu Iwata},
  title     = {Improved Authenticity Bound of EAX, and Refinements},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {792},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/792},
  timestamp = {Wed, 01 Jan 2014 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/MinematsuLI13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IwataOM12,
  author    = {Tetsu Iwata and
               Keisuke Ohashi and
               Kazuhiko Minematsu},
  title     = {Breaking and Repairing {GCM} Security Proofs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  pages     = {31--49},
  year      = {2012},
  crossref  = {DBLP:conf/crypto/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-32009-5_3},
  doi       = {10.1007/978-3-642-32009-5_3},
  timestamp = {Mon, 13 Aug 2012 13:57:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/IwataOM12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SuzakiMMK12,
  author    = {Tomoyasu Suzaki and
               Kazuhiko Minematsu and
               Sumio Morioka and
               Eita Kobayashi},
  title     = {{\textdollar}{\textbackslash}textnormal\{{\textbackslash}textsc\{TWINE\}\}{\textdollar}
               : {A} Lightweight Block Cipher for Multiple Platforms},
  booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  pages     = {339--354},
  year      = {2012},
  crossref  = {DBLP:conf/sacrypt/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-35999-6_22},
  doi       = {10.1007/978-3-642-35999-6_22},
  timestamp = {Mon, 04 Feb 2013 15:09:51 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/SuzakiMMK12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuMI12,
  author    = {Kazuhiko Minematsu and
               Hiraku Morita and
               Tetsu Iwata},
  title     = {Cryptanalysis of EAXprime},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {18},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/018},
  timestamp = {Tue, 08 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/MinematsuMI12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/IwataOM12,
  author    = {Tetsu Iwata and
               Keisuke Ohashi and
               Kazuhiko Minematsu},
  title     = {Breaking and Repairing {GCM} Security Proofs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {438},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/438},
  timestamp = {Tue, 08 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/IwataOM12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MinematsuSS11,
  author    = {Kazuhiko Minematsu and
               Tomoyasu Suzaki and
               Maki Shigeri},
  title     = {On Maximum Differential Probability of Generalized Feistel},
  booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
               2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  pages     = {89--105},
  year      = {2011},
  crossref  = {DBLP:conf/acisp/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-22497-3_7},
  doi       = {10.1007/978-3-642-22497-3_7},
  timestamp = {Mon, 11 Jul 2011 15:16:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/MinematsuSS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ima/MinematsuI11,
  author    = {Kazuhiko Minematsu and
               Tetsu Iwata},
  title     = {Building Blockcipher from Tweakable Blockcipher: Extending {FSE} 2009
               Proposal},
  booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
               2011, Oxford, UK, December 12-15, 2011. Proceedings},
  pages     = {391--412},
  year      = {2011},
  crossref  = {DBLP:conf/ima/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25516-8_24},
  doi       = {10.1007/978-3-642-25516-8_24},
  timestamp = {Wed, 07 Dec 2011 15:22:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ima/MinematsuI11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/SuzakiM10,
  author    = {Tomoyasu Suzaki and
               Kazuhiko Minematsu},
  title     = {Improving the Generalized Feistel},
  booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  pages     = {19--39},
  year      = {2010},
  crossref  = {DBLP:conf/fse/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-13858-4_2},
  doi       = {10.1007/978-3-642-13858-4_2},
  timestamp = {Tue, 29 Jun 2010 11:04:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/SuzakiM10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/Minematsu10,
  author    = {Kazuhiko Minematsu},
  title     = {How to Thwart Birthday Attacks against MACs via Small Randomness},
  booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  pages     = {230--249},
  year      = {2010},
  crossref  = {DBLP:conf/fse/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-13858-4_13},
  doi       = {10.1007/978-3-642-13858-4_13},
  timestamp = {Tue, 29 Jun 2010 11:04:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/Minematsu10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/MinematsuM09,
  author    = {Kazuhiko Minematsu and
               Toshiyasu Matsushima},
  title     = {Generalization and Extension of XEX\({}^{\mbox{*}}\) Mode},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {2},
  pages     = {517--524},
  year      = {2009},
  url       = {http://search.ieice.org/bin/summary.php?id=e92-a_2_517&category=A&year=2009&lang=E&abst=},
  timestamp = {Thu, 30 Jul 2009 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/MinematsuM09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/Minematsu09,
  author    = {Kazuhiko Minematsu},
  title     = {Beyond-Birthday-Bound Security Based on Tweakable Block Cipher},
  booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  pages     = {308--326},
  year      = {2009},
  crossref  = {DBLP:conf/fse/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-03317-9_19},
  doi       = {10.1007/978-3-642-03317-9_19},
  timestamp = {Mon, 20 Jul 2009 12:15:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/Minematsu09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/MinematsuM07,
  author    = {Kazuhiko Minematsu and
               Toshiyasu Matsushima},
  title     = {Improved MACs from Differentially-Uniform Permutations},
  journal   = {{IEICE} Transactions},
  volume    = {90-A},
  number    = {12},
  pages     = {2908--2915},
  year      = {2007},
  url       = {http://dx.doi.org/10.1093/ietfec/e90-a.12.2908},
  doi       = {10.1093/ietfec/e90-a.12.2908},
  timestamp = {Tue, 15 Jan 2008 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/MinematsuM07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinematsuM07,
  author    = {Kazuhiko Minematsu and
               Toshiyasu Matsushima},
  title     = {New Bounds for PMAC, TMAC, and {XCBC}},
  booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  pages     = {434--451},
  year      = {2007},
  crossref  = {DBLP:conf/fse/2007},
  url       = {http://dx.doi.org/10.1007/978-3-540-74619-5_27},
  doi       = {10.1007/978-3-540-74619-5_27},
  timestamp = {Mon, 03 Sep 2007 11:02:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/MinematsuM07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MinematsuM07,
  author    = {Kazuhiko Minematsu and
               Toshiyasu Matsushima},
  title     = {Tweakable Enciphering Schemes from Hash-Sum-Expansion},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
               on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  pages     = {252--267},
  year      = {2007},
  crossref  = {DBLP:conf/indocrypt/2007},
  url       = {http://dx.doi.org/10.1007/978-3-540-77026-8_19},
  doi       = {10.1007/978-3-540-77026-8_19},
  timestamp = {Thu, 13 Dec 2007 12:08:08 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/MinematsuM07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijisec/TsunooTSKM06,
  author    = {Yukiyasu Tsunoo and
               Etsuko Tsujihara and
               Maki Shigeri and
               Hiroyasu Kubo and
               Kazuhiko Minematsu},
  title     = {Improving cache attacks by considering cipher structure},
  journal   = {Int. J. Inf. Sec.},
  volume    = {5},
  number    = {3},
  pages     = {166--176},
  year      = {2006},
  url       = {http://dx.doi.org/10.1007/s10207-005-0079-7},
  doi       = {10.1007/s10207-005-0079-7},
  timestamp = {Mon, 03 Jul 2006 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ijisec/TsunooTSKM06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinematsuT06,
  author    = {Kazuhiko Minematsu and
               Yukiyasu Tsunoo},
  title     = {Provably Secure MACs from Differentially-Uniform Permutations and
               AES-Based Implementations},
  booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
               Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  pages     = {226--241},
  year      = {2006},
  crossref  = {DBLP:conf/fse/2006},
  url       = {http://dx.doi.org/10.1007/11799313_15},
  doi       = {10.1007/11799313_15},
  timestamp = {Fri, 15 Dec 2006 15:53:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/MinematsuT06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Minematsu06,
  author    = {Kazuhiko Minematsu},
  title     = {Improved Security Analysis of {XEX} and {LRW} Modes},
  booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
               2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  pages     = {96--113},
  year      = {2006},
  crossref  = {DBLP:conf/sacrypt/2006},
  url       = {http://dx.doi.org/10.1007/978-3-540-74462-7_8},
  doi       = {10.1007/978-3-540-74462-7_8},
  timestamp = {Mon, 01 Oct 2007 08:22:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/Minematsu06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/TsunooSSKM05,
  author    = {Yukiyasu Tsunoo and
               Teruo Saito and
               Maki Shigeri and
               Hiroyasu Kubo and
               Kazuhiko Minematsu},
  title     = {Shorter bit sequence is enough to break stream cipher {LILI-128}},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {51},
  number    = {12},
  pages     = {4312--4319},
  year      = {2005},
  url       = {http://dx.doi.org/10.1109/TIT.2005.859285},
  doi       = {10.1109/TIT.2005.859285},
  timestamp = {Wed, 09 Mar 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tit/TsunooSSKM05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MinematsuT05,
  author    = {Kazuhiko Minematsu and
               Yukiyasu Tsunoo},
  title     = {Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components},
  booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  pages     = {242--260},
  year      = {2005},
  crossref  = {DBLP:conf/icisc/2005},
  url       = {http://dx.doi.org/10.1007/11734727_21},
  doi       = {10.1007/11734727_21},
  timestamp = {Mon, 21 Aug 2006 14:37:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/MinematsuT05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MinematsuT05a,
  author    = {Kazuhiko Minematsu and
               Yukiyasu Tsunoo},
  title     = {Expanding Weak {PRF} with Small Key Size},
  booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  pages     = {284--298},
  year      = {2005},
  crossref  = {DBLP:conf/icisc/2005},
  url       = {http://dx.doi.org/10.1007/11734727_24},
  doi       = {10.1007/11734727_24},
  timestamp = {Mon, 21 Aug 2006 14:37:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/MinematsuT05a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2016-2,
  editor    = {Joseph K. Liu and
               Ron Steinfeld},
  title     = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9723},
  publisher = {Springer},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-319-40367-0},
  doi       = {10.1007/978-3-319-40367-0},
  isbn      = {978-3-319-40366-3},
  timestamp = {Fri, 08 Jul 2016 11:27:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/host/2016,
  editor    = {William H. Robinson and
               Swarup Bhunia and
               Ryan Kastner},
  title     = {2016 {IEEE} International Symposium on Hardware Oriented Security
               and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7489989},
  isbn      = {978-1-4673-8826-9},
  timestamp = {Sat, 25 Jun 2016 18:10:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/host/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/provsec/2016,
  editor    = {Liqun Chen and
               Jinguang Han},
  title     = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
               China, November 10-11, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10005},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-319-47422-9},
  doi       = {10.1007/978-3-319-47422-9},
  isbn      = {978-3-319-47421-2},
  timestamp = {Thu, 03 Nov 2016 13:47:47 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/provsec/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015-1,
  editor    = {G{\"{u}}nther Pernul and
               Peter Y. A. Ryan and
               Edgar R. Weippl},
  title     = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9326},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-24174-6},
  doi       = {10.1007/978-3-319-24174-6},
  isbn      = {978-3-319-24173-9},
  timestamp = {Mon, 12 Oct 2015 13:35:11 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/2015-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2015,
  editor    = {Gregor Leander},
  title     = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
               Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9054},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-662-48116-5},
  doi       = {10.1007/978-3-662-48116-5},
  isbn      = {978-3-662-48115-8},
  timestamp = {Wed, 12 Aug 2015 12:56:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ima/2015,
  editor    = {Jens Groth},
  title     = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
               2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9496},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-27239-9},
  doi       = {10.1007/978-3-319-27239-9},
  isbn      = {978-3-319-27238-2},
  timestamp = {Tue, 08 Dec 2015 12:05:30 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ima/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/date/2014,
  editor    = {Gerhard Fettweis and
               Wolfgang Nebel},
  title     = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
               {DATE} 2014, Dresden, Germany, March 24-28, 2014},
  publisher = {European Design and Automation Association},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6784162},
  isbn      = {978-3-9815370-2-4},
  timestamp = {Tue, 10 Nov 2015 12:54:15 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/date/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2014,
  editor    = {Phong Q. Nguyen and
               Elisabeth Oswald},
  title     = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8441},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-642-55220-5},
  doi       = {10.1007/978-3-642-55220-5},
  isbn      = {978-3-642-55219-9},
  timestamp = {Fri, 02 May 2014 13:36:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2014,
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-662-46706-0},
  doi       = {10.1007/978-3-662-46706-0},
  isbn      = {978-3-662-46705-3},
  timestamp = {Wed, 22 Apr 2015 15:40:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2013,
  editor    = {Shiho Moriai},
  title     = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
               Singapore, March 11-13, 2013. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8424},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-43933-3},
  doi       = {10.1007/978-3-662-43933-3},
  isbn      = {978-3-662-43932-6},
  timestamp = {Tue, 08 Jul 2014 12:20:37 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/provsec/2013,
  editor    = {Willy Susilo and
               Reza Reyhanitabar},
  title     = {Provable Security - 7th International Conference, ProvSec 2013, Melaka,
               Malaysia, October 23-25, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8209},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-41227-1},
  doi       = {10.1007/978-3-642-41227-1},
  isbn      = {978-3-642-41226-4},
  timestamp = {Thu, 21 Nov 2013 11:34:07 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/provsec/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2012,
  editor    = {Reihaneh Safavi{-}Naini and
               Ran Canetti},
  title     = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7417},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-32009-5},
  doi       = {10.1007/978-3-642-32009-5},
  isbn      = {978-3-642-32008-8},
  timestamp = {Mon, 13 Aug 2012 13:57:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2012,
  editor    = {Lars R. Knudsen and
               Huapeng Wu},
  title     = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7707},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-35999-6},
  doi       = {10.1007/978-3-642-35999-6},
  isbn      = {978-3-642-35998-9},
  timestamp = {Mon, 04 Feb 2013 15:09:51 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2011,
  editor    = {Udaya Parampalli and
               Philip Hawkes},
  title     = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
               2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6812},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-22497-3},
  doi       = {10.1007/978-3-642-22497-3},
  isbn      = {978-3-642-22496-6},
  timestamp = {Mon, 11 Jul 2011 15:16:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ima/2011,
  editor    = {Liqun Chen},
  title     = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
               2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7089},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25516-8},
  doi       = {10.1007/978-3-642-25516-8},
  isbn      = {978-3-642-25515-1},
  timestamp = {Wed, 07 Dec 2011 15:22:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ima/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2010,
  editor    = {Seokhie Hong and
               Tetsu Iwata},
  title     = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6147},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-13858-4},
  doi       = {10.1007/978-3-642-13858-4},
  isbn      = {978-3-642-13857-7},
  timestamp = {Tue, 29 Jun 2010 11:04:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2009,
  editor    = {Orr Dunkelman},
  title     = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5665},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-03317-9},
  doi       = {10.1007/978-3-642-03317-9},
  isbn      = {978-3-642-03316-2},
  timestamp = {Mon, 20 Jul 2009 12:15:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2007,
  editor    = {Alex Biryukov},
  title     = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4593},
  publisher = {Springer},
  year      = {2007},
  isbn      = {978-3-540-74617-1},
  timestamp = {Mon, 03 Sep 2007 11:02:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2007,
  editor    = {K. Srinathan and
               C. Pandu Rangan and
               Moti Yung},
  title     = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
               on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4859},
  publisher = {Springer},
  year      = {2007},
  isbn      = {978-3-540-77025-1},
  timestamp = {Thu, 13 Dec 2007 12:08:08 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2006,
  editor    = {Matthew J. B. Robshaw},
  title     = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
               Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4047},
  publisher = {Springer},
  year      = {2006},
  isbn      = {3-540-36597-4},
  timestamp = {Fri, 15 Dec 2006 15:53:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2006,
  editor    = {Eli Biham and
               Amr M. Youssef},
  title     = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
               2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4356},
  publisher = {Springer},
  year      = {2007},
  isbn      = {978-3-540-74461-0},
  timestamp = {Mon, 01 Oct 2007 08:22:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2005,
  editor    = {Dongho Won and
               Seungjoo Kim},
  title     = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3935},
  publisher = {Springer},
  year      = {2006},
  isbn      = {3-540-33354-1},
  timestamp = {Mon, 21 Aug 2006 14:37:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier