BibTeX records: Ryo Nishimaki

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/KitagawaNT18,
  author    = {Fuyuki Kitagawa and
               Ryo Nishimaki and
               Keisuke Tanaka},
  title     = {Obfustopia Built on Secret-Key Functional Encryption},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  pages     = {603--648},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-78375-8_20},
  doi       = {10.1007/978-3-319-78375-8_20},
  timestamp = {Sat, 05 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/KitagawaNT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KitagawaNT18,
  author    = {Fuyuki Kitagawa and
               Ryo Nishimaki and
               Keisuke Tanaka},
  title     = {Simple and Generic Constructions of Succinct Functional Encryption},
  booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
               Brazil, March 25-29, 2018, Proceedings, Part {II}},
  pages     = {187--217},
  year      = {2018},
  crossref  = {DBLP:conf/pkc/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-76581-5_7},
  doi       = {10.1007/978-3-319-76581-5_7},
  timestamp = {Fri, 13 Apr 2018 14:52:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/KitagawaNT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Attrapadung0N0Y18,
  author    = {Nuttapong Attrapadung and
               Takahiro Matsuda and
               Ryo Nishimaki and
               Shota Yamada and
               Takashi Yamakawa},
  title     = {Constrained PRFs for {NC1} in Traditional Groups},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {154},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/154},
  timestamp = {Tue, 20 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Attrapadung0N0Y18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbeHNOP17,
  author    = {Masayuki Abe and
               Dennis Hofheinz and
               Ryo Nishimaki and
               Miyako Ohkubo and
               Jiaxin Pan},
  title     = {Compact Structure-Preserving Signatures with Almost Tight Security},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  pages     = {548--580},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-63715-0_19},
  doi       = {10.1007/978-3-319-63715-0_19},
  timestamp = {Mon, 14 Aug 2017 14:37:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/AbeHNOP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17,
  author    = {Fuyuki Kitagawa and
               Ryo Nishimaki and
               Keisuke Tanaka},
  title     = {Indistinguishability Obfuscation: Simpler Constructions using Secret-Key
               Functional Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {275},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/275},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KitagawaNT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17a,
  author    = {Fuyuki Kitagawa and
               Ryo Nishimaki and
               Keisuke Tanaka},
  title     = {Indistinguishability Obfuscation for All Circuits from Secret-Key
               Functional Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {361},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/361},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KitagawaNT17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeHNOP17,
  author    = {Masayuki Abe and
               Dennis Hofheinz and
               Ryo Nishimaki and
               Miyako Ohkubo and
               Jiaxin Pan},
  title     = {Compact Structure-preserving Signatures with Almost Tight Security},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {524},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/524},
  timestamp = {Wed, 21 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AbeHNOP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17b,
  author    = {Fuyuki Kitagawa and
               Ryo Nishimaki and
               Keisuke Tanaka},
  title     = {From Single-Key to Collusion-Resistant Secret-Key Functional Encryption
               by Leveraging Succinctness},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {638},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/638},
  timestamp = {Tue, 25 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KitagawaNT17b},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbeCDKNO16,
  author    = {Masayuki Abe and
               Melissa Chase and
               Bernardo David and
               Markulf Kohlweiss and
               Ryo Nishimaki and
               Miyako Ohkubo},
  title     = {Constant-Size Structure-Preserving Signatures: Generic Constructions
               and Simple Assumptions},
  journal   = {J. Cryptology},
  volume    = {29},
  number    = {4},
  pages     = {833--878},
  year      = {2016},
  url       = {https://doi.org/10.1007/s00145-015-9211-7},
  doi       = {10.1007/s00145-015-9211-7},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/AbeCDKNO16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NishimakiWZ16,
  author    = {Ryo Nishimaki and
               Daniel Wichs and
               Mark Zhandry},
  title     = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a
               Key},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  pages     = {388--419},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-49896-5_14},
  doi       = {10.1007/978-3-662-49896-5_14},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/NishimakiWZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Nishimaki16,
  author    = {Ryo Nishimaki},
  title     = {Watermarking Cryptographic Programs},
  booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
               Cryptology - Second International Conference, Mycrypt 2016, Kuala
               Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  pages     = {521--543},
  year      = {2016},
  crossref  = {DBLP:conf/mycrypt/2016},
  url       = {https://doi.org/10.1007/978-3-319-61273-7_28},
  doi       = {10.1007/978-3-319-61273-7_28},
  timestamp = {Fri, 14 Jul 2017 12:13:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mycrypt/Nishimaki16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CohenHNVW16,
  author    = {Aloni Cohen and
               Justin Holmgren and
               Ryo Nishimaki and
               Vinod Vaikuntanathan and
               Daniel Wichs},
  title     = {Watermarking cryptographic capabilities},
  booktitle = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
               of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  pages     = {1115--1127},
  year      = {2016},
  crossref  = {DBLP:conf/stoc/2016},
  url       = {http://doi.acm.org/10.1145/2897518.2897651},
  doi       = {10.1145/2897518.2897651},
  timestamp = {Fri, 10 Jun 2016 10:30:30 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/CohenHNVW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyNPW16,
  author    = {Nir Bitansky and
               Ryo Nishimaki and
               Alain Passel{\`{e}}gue and
               Daniel Wichs},
  title     = {From Cryptomania to Obfustopia Through Secret-Key Functional Encryption},
  booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  pages     = {391--418},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016b2},
  url       = {https://doi.org/10.1007/978-3-662-53644-5_15},
  doi       = {10.1007/978-3-662-53644-5_15},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/BitanskyNPW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyNPW16,
  author    = {Nir Bitansky and
               Ryo Nishimaki and
               Alain Passel{\`{e}}gue and
               Daniel Wichs},
  title     = {From Cryptomania to Obfustopia through Secret-Key Functional Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {558},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/558},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BitanskyNPW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NishimakiX15,
  author    = {Ryo Nishimaki and
               Keita Xagawa},
  title     = {Verifiably encrypted signatures with short keys based on the decisional
               linear problem and obfuscation for encrypted {VES}},
  journal   = {Des. Codes Cryptography},
  volume    = {77},
  number    = {1},
  pages     = {61--98},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-014-9986-9},
  doi       = {10.1007/s10623-014-9986-9},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/NishimakiX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiX15,
  author    = {Ryo Nishimaki and
               Keita Xagawa},
  title     = {Key-Private Proxy Re-Encryption from Lattices, Revisited},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {100--116},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_1_100},
  timestamp = {Tue, 19 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/NishimakiX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujisakiKNTY15,
  author    = {Eiichiro Fujisaki and
               Akinori Kawachi and
               Ryo Nishimaki and
               Keisuke Tanaka and
               Kenji Yasunaga},
  title     = {Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split
               State Model},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {3},
  pages     = {853--862},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_3_853},
  timestamp = {Tue, 19 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/FujisakiKNTY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DavidNRT15,
  author    = {Bernardo Machado David and
               Ryo Nishimaki and
               Samuel Ranellucci and
               Alain Tapp},
  title     = {Generalizing Efficient Multiparty Computation},
  booktitle = {Information Theoretic Security - 8th International Conference, {ICITS}
               2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  pages     = {15--32},
  year      = {2015},
  crossref  = {DBLP:conf/icits/2015},
  url       = {https://doi.org/10.1007/978-3-319-17470-9_2},
  doi       = {10.1007/978-3-319-17470-9_2},
  timestamp = {Wed, 17 May 2017 10:54:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icits/DavidNRT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidNRT15,
  author    = {Bernardo David and
               Ryo Nishimaki and
               Samuel Ranellucci and
               Alain Tapp},
  title     = {Generalizing Efficient Multiparty Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {135},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/135},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DavidNRT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiX15,
  author    = {Ryo Nishimaki and
               Keita Xagawa},
  title     = {Verifiably Encrypted Signatures with Short Keys based on the Decisional
               Linear Problem and Obfuscation for Encrypted {VES}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {248},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/248},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/NishimakiX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeDKNO15,
  author    = {Masayuki Abe and
               Bernardo David and
               Markulf Kohlweiss and
               Ryo Nishimaki and
               Miyako Ohkubo},
  title     = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {311},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/311},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AbeDKNO15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiW15,
  author    = {Ryo Nishimaki and
               Daniel Wichs},
  title     = {Watermarking Cryptographic Programs Against Arbitrary Removal Strategies},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {344},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/344},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/NishimakiW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranCLNX15,
  author    = {Nishanth Chandran and
               Melissa Chase and
               Feng{-}Hao Liu and
               Ryo Nishimaki and
               Keita Xagawa},
  title     = {Re-encryption, functional re-encryption, and multi-hop re-encryption:
               {A} framework for achieving obfuscation-based security and instantiations
               from lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {491},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/491},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChandranCLNX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiWZ15,
  author    = {Ryo Nishimaki and
               Daniel Wichs and
               Mark Zhandry},
  title     = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a
               Key},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {750},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/750},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/NishimakiWZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenHNVW15,
  author    = {Aloni Cohen and
               Justin Holmgren and
               Ryo Nishimaki and
               Vinod Vaikuntanathan and
               Daniel Wichs},
  title     = {Watermarking Cryptographic Capabilities},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1096},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1096},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CohenHNVW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChandranCLNX14,
  author    = {Nishanth Chandran and
               Melissa Chase and
               Feng{-}Hao Liu and
               Ryo Nishimaki and
               Keita Xagawa},
  title     = {Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption:
               {A} Framework for Achieving Obfuscation-Based Security and Instantiations
               from Lattices},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  pages     = {95--112},
  year      = {2014},
  crossref  = {DBLP:conf/pkc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0_6},
  doi       = {10.1007/978-3-642-54631-0_6},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/ChandranCLNX14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nishimaki14,
  author    = {Ryo Nishimaki},
  title     = {How to Watermark Cryptographic Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {472},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/472},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Nishimaki14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/AbeCDN13,
  author    = {Masayuki Abe and
               Jan Camenisch and
               Maria Dubovitskaya and
               Ryo Nishimaki},
  title     = {Universally composable adaptive oblivious transfer (with access control)
               from standard assumptions},
  booktitle = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Berlin, Germany, November 8, 2013},
  pages     = {1--12},
  year      = {2013},
  crossref  = {DBLP:conf/dim/2013},
  url       = {http://doi.acm.org/10.1145/2517881.2517883},
  doi       = {10.1145/2517881.2517883},
  timestamp = {Mon, 09 Dec 2013 15:49:10 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/AbeCDN13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Nishimaki13,
  author    = {Ryo Nishimaki},
  title     = {How to Watermark Cryptographic Functions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  pages     = {111--125},
  year      = {2013},
  crossref  = {DBLP:conf/eurocrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9_7},
  doi       = {10.1007/978-3-642-38348-9_7},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Nishimaki13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeDKNO13,
  author    = {Masayuki Abe and
               Bernardo David and
               Markulf Kohlweiss and
               Ryo Nishimaki and
               Miyako Ohkubo},
  title     = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size},
  booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
               on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
               26 - March 1, 2013. Proceedings},
  pages     = {312--331},
  year      = {2013},
  crossref  = {DBLP:conf/pkc/2013},
  url       = {https://doi.org/10.1007/978-3-642-36362-7_20},
  doi       = {10.1007/978-3-642-36362-7_20},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/AbeDKNO13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NishimakiX13,
  author    = {Ryo Nishimaki and
               Keita Xagawa},
  title     = {Verifiably Encrypted Signatures with Short Keys Based on the Decisional
               Linear Problem and Obfuscation for Encrypted {VES}},
  booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
               on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
               26 - March 1, 2013. Proceedings},
  pages     = {405--422},
  year      = {2013},
  crossref  = {DBLP:conf/pkc/2013},
  url       = {https://doi.org/10.1007/978-3-642-36362-7_25},
  doi       = {10.1007/978-3-642-36362-7_25},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/NishimakiX13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiFT12,
  author    = {Ryo Nishimaki and
               Eiichiro Fujisaki and
               Keisuke Tanaka},
  title     = {An Efficient Non-interactive Universally Composable String-Commitment
               Scheme},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {167--175},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_1_167},
  timestamp = {Fri, 13 Jan 2012 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/NishimakiFT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiFT12a,
  author    = {Ryo Nishimaki and
               Eiichiro Fujisaki and
               Keisuke Tanaka},
  title     = {A Multi-Trapdoor Commitment Scheme from the {RSA} Assumption},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {176--184},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_1_176},
  timestamp = {Fri, 13 Jan 2012 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/NishimakiFT12a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbeCDKNO12,
  author    = {Masayuki Abe and
               Melissa Chase and
               Bernardo David and
               Markulf Kohlweiss and
               Ryo Nishimaki and
               Miyako Ohkubo},
  title     = {Constant-Size Structure-Preserving Signatures: Generic Constructions
               and Simple Assumptions},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {4--24},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4_3},
  doi       = {10.1007/978-3-642-34961-4_3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/AbeCDKNO12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeCDKNO12,
  author    = {Masayuki Abe and
               Melissa Chase and
               Bernardo David and
               Markulf Kohlweiss and
               Ryo Nishimaki and
               Miyako Ohkubo},
  title     = {Constant-Size Structure-Preserving Signatures: Generic Constructions
               and Simple Assumptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {285},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/285},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AbeCDKNO12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NishimakiFT10,
  author    = {Ryo Nishimaki and
               Eiichiro Fujisaki and
               Keisuke Tanaka},
  title     = {A Multi-trapdoor Commitment Scheme from the {RSA} Assumption},
  booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
               2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  pages     = {182--199},
  year      = {2010},
  crossref  = {DBLP:conf/acisp/2010},
  url       = {https://doi.org/10.1007/978-3-642-14081-5_12},
  doi       = {10.1007/978-3-642-14081-5_12},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/NishimakiFT10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MatsudaNT10,
  author    = {Toshihide Matsuda and
               Ryo Nishimaki and
               Keisuke Tanaka},
  title     = {{CCA} Proxy Re-Encryption without Bilinear Maps in the Standard Model},
  booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  pages     = {261--278},
  year      = {2010},
  crossref  = {DBLP:conf/pkc/2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7_16},
  doi       = {10.1007/978-3-642-13013-7_16},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/MatsudaNT10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MatsudaNNT09,
  author    = {Toshihide Matsuda and
               Ryo Nishimaki and
               Akira Numayama and
               Keisuke Tanaka},
  title     = {Security on Hybrid Encryption with the Tag-KEM/DEM Framework},
  booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  pages     = {343--359},
  year      = {2009},
  crossref  = {DBLP:conf/acisp/2009},
  url       = {https://doi.org/10.1007/978-3-642-02620-1_24},
  doi       = {10.1007/978-3-642-02620-1_24},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/MatsudaNNT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NishimakiFT09,
  author    = {Ryo Nishimaki and
               Eiichiro Fujisaki and
               Keisuke Tanaka},
  title     = {Efficient Non-interactive Universally Composable String-Commitment
               Schemes},
  booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  pages     = {3--18},
  year      = {2009},
  crossref  = {DBLP:conf/provsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1_3},
  doi       = {10.1007/978-3-642-04642-1_3},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/NishimakiFT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FujisakiNT09,
  author    = {Eiichiro Fujisaki and
               Ryo Nishimaki and
               Keisuke Tanaka},
  title     = {On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash
               Functions},
  booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  pages     = {118--128},
  year      = {2009},
  crossref  = {DBLP:conf/provsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1_11},
  doi       = {10.1007/978-3-642-04642-1_11},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/FujisakiNT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiMO08,
  author    = {Ryo Nishimaki and
               Yoshifumi Manabe and
               Tatsuaki Okamoto},
  title     = {Universally Composable Identity-Based Encryption},
  journal   = {{IEICE} Transactions},
  volume    = {91-A},
  number    = {1},
  pages     = {262--271},
  year      = {2008},
  url       = {https://doi.org/10.1093/ietfec/e91-a.1.262},
  doi       = {10.1093/ietfec/e91-a.1.262},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/NishimakiMO08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/NishimakiMO06,
  author    = {Ryo Nishimaki and
               Yoshifumi Manabe and
               Tatsuaki Okamoto},
  title     = {Universally Composable Identity-Based Encryption},
  booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conferenceon
               Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
               Selected Papers},
  pages     = {337--353},
  year      = {2006},
  crossref  = {DBLP:conf/vietcrypt/2006},
  url       = {https://doi.org/10.1007/11958239_23},
  doi       = {10.1007/11958239_23},
  timestamp = {Fri, 19 May 2017 01:25:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vietcrypt/NishimakiMO06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-2,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10821},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78375-8},
  doi       = {10.1007/978-3-319-78375-8},
  isbn      = {978-3-319-78374-1},
  timestamp = {Mon, 16 Apr 2018 14:00:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2018-2,
  editor    = {Michel Abdalla and
               Ricardo Dahab},
  title     = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
               Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10770},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-76581-5},
  doi       = {10.1007/978-3-319-76581-5},
  isbn      = {978-3-319-76580-8},
  timestamp = {Fri, 13 Apr 2018 14:52:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-2,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10402},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63715-0},
  doi       = {10.1007/978-3-319-63715-0},
  isbn      = {978-3-319-63714-3},
  timestamp = {Mon, 14 Aug 2017 14:37:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-2,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9666},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49896-5},
  doi       = {10.1007/978-3-662-49896-5},
  isbn      = {978-3-662-49895-8},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mycrypt/2016,
  editor    = {Raphael C.{-}W. Phan and
               Moti Yung},
  title     = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
               Cryptology - Second International Conference, Mycrypt 2016, Kuala
               Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10311},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61273-7},
  doi       = {10.1007/978-3-319-61273-7},
  isbn      = {978-3-319-61272-0},
  timestamp = {Fri, 14 Jul 2017 12:13:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mycrypt/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/2016,
  editor    = {Daniel Wichs and
               Yishay Mansour},
  title     = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
               of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2897518},
  isbn      = {978-1-4503-4132-5},
  timestamp = {Fri, 10 Jun 2016 10:30:30 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b2,
  editor    = {Martin Hirt and
               Adam D. Smith},
  title     = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9986},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53644-5},
  doi       = {10.1007/978-3-662-53644-5},
  isbn      = {978-3-662-53643-8},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2016b2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2015,
  editor    = {Anja Lehmann and
               Stefan Wolf},
  title     = {Information Theoretic Security - 8th International Conference, {ICITS}
               2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9063},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17470-9},
  doi       = {10.1007/978-3-319-17470-9},
  isbn      = {978-3-319-17469-3},
  timestamp = {Wed, 17 May 2017 10:54:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icits/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2014,
  editor    = {Hugo Krawczyk},
  title     = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0},
  doi       = {10.1007/978-3-642-54631-0},
  isbn      = {978-3-642-54630-3},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2013,
  editor    = {Thomas Gro{\ss} and
               Marit Hansen},
  title     = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Berlin, Germany, November 8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517881},
  isbn      = {978-1-4503-2493-9},
  timestamp = {Mon, 09 Dec 2013 15:49:10 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9},
  doi       = {10.1007/978-3-642-38348-9},
  isbn      = {978-3-642-38347-2},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2013,
  editor    = {Kaoru Kurosawa and
               Goichiro Hanaoka},
  title     = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
               on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
               26 - March 1, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7778},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-36362-7},
  doi       = {10.1007/978-3-642-36362-7},
  isbn      = {978-3-642-36361-0},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2012,
  editor    = {Xiaoyun Wang and
               Kazue Sako},
  title     = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7658},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4},
  doi       = {10.1007/978-3-642-34961-4},
  isbn      = {978-3-642-34960-7},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2010,
  editor    = {Ron Steinfeld and
               Philip Hawkes},
  title     = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
               2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6168},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14081-5},
  doi       = {10.1007/978-3-642-14081-5},
  isbn      = {978-3-642-14080-8},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2010,
  editor    = {Phong Q. Nguyen and
               David Pointcheval},
  title     = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6056},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7},
  doi       = {10.1007/978-3-642-13013-7},
  isbn      = {978-3-642-13012-0},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2009,
  editor    = {Colin Boyd and
               Juan Manuel Gonz{\'{a}}lez Nieto},
  title     = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5594},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02620-1},
  doi       = {10.1007/978-3-642-02620-1},
  isbn      = {978-3-642-02619-5},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2009,
  editor    = {Josef Pieprzyk and
               Fangguo Zhang},
  title     = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5848},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1},
  doi       = {10.1007/978-3-642-04642-1},
  isbn      = {978-3-642-04641-4},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vietcrypt/2006,
  editor    = {Phong Q. Nguyen},
  title     = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conferenceon
               Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4341},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11958239},
  doi       = {10.1007/11958239},
  isbn      = {3-540-68799-8},
  timestamp = {Fri, 19 May 2017 01:25:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vietcrypt/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier