BibTeX records: Pascal Paillier

download as .bib file

@inproceedings{DBLP:conf/fse/CanteautCFLNPS16,
  author    = {Anne Canteaut and
               Sergiu Carpov and
               Caroline Fontaine and
               Tancr{\`{e}}de Lepoint and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Pascal Paillier and
               Renaud Sirdey},
  title     = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext
               Compression},
  booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  pages     = {313--333},
  year      = {2016},
  crossref  = {DBLP:conf/fse/2016},
  url       = {https://doi.org/10.1007/978-3-662-52993-5_16},
  doi       = {10.1007/978-3-662-52993-5_16},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/CanteautCFLNPS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/daglib/p/MikkelsenDGJGNPPSSZ15,
  author    = {Gert L{\ae}ss{\o}e Mikkelsen and
               Kasper Damg{\aa}rd and
               Hans Guldager and
               Jonas Lindstr{\o}m Jensen and
               Jesus Luna Garcia and
               Janus Dam Nielsen and
               Pascal Paillier and
               Giancarlo Pellegrino and
               Michael Bladt Stausholm and
               Neeraj Suri and
               Heng Zhang},
  title     = {Technical Implementation and Feasibility},
  booktitle = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  pages     = {255--317},
  year      = {2015},
  crossref  = {DBLP:books/daglib/0039026},
  url       = {https://doi.org/10.1007/978-3-319-14439-9_9},
  doi       = {10.1007/978-3-319-14439-9_9},
  timestamp = {Tue, 16 May 2017 14:01:41 +0200},
  biburl    = {http://dblp.org/rec/bib/books/daglib/p/MikkelsenDGJGNPPSSZ15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CanteautCFLNPS15,
  author    = {Anne Canteaut and
               Sergiu Carpov and
               Caroline Fontaine and
               Tancr{\`{e}}de Lepoint and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Pascal Paillier and
               Renaud Sirdey},
  title     = {How to Compress Homomorphic Ciphertexts},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {113},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/113},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CanteautCFLNPS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/LepointP13,
  author    = {Tancr{\`{e}}de Lepoint and
               Pascal Paillier},
  title     = {On the Minimal Number of Bootstrappings in Homomorphic Circuits},
  booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
               and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  pages     = {189--200},
  year      = {2013},
  crossref  = {DBLP:conf/fc/2013w},
  url       = {https://doi.org/10.1007/978-3-642-41320-9_13},
  doi       = {10.1007/978-3-642-41320-9_13},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/LepointP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DelerableeLPR13,
  author    = {C{\'{e}}cile Delerabl{\'{e}}e and
               Tancr{\`{e}}de Lepoint and
               Pascal Paillier and
               Matthieu Rivain},
  title     = {White-Box Security Notions for Symmetric Encryption Schemes},
  booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
               Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  pages     = {247--264},
  year      = {2013},
  crossref  = {DBLP:conf/sacrypt/2013},
  url       = {https://doi.org/10.1007/978-3-662-43414-7_13},
  doi       = {10.1007/978-3-662-43414-7_13},
  timestamp = {Mon, 25 Sep 2017 10:36:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/DelerableeLPR13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DelerableeLPR13,
  author    = {C{\'{e}}cile Delerabl{\'{e}}e and
               Tancr{\`{e}}de Lepoint and
               Pascal Paillier and
               Matthieu Rivain},
  title     = {White-Box Security Notions for Symmetric Encryption Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {523},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/523},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DelerableeLPR13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/apf/BjonesKPR12,
  author    = {Ronny Bjones and
               Ioannis Krontiris and
               Pascal Paillier and
               Kai Rannenberg},
  title     = {Integrating Anonymous Credentials with eIDs for Privacy-Respecting
               Online Authentication},
  booktitle = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF}
               2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers},
  pages     = {111--124},
  year      = {2012},
  crossref  = {DBLP:conf/apf/2012},
  url       = {https://doi.org/10.1007/978-3-642-54069-1_7},
  doi       = {10.1007/978-3-642-54069-1_7},
  timestamp = {Tue, 23 May 2017 01:06:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/apf/BjonesKPR12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/birthday/CoronGIP12,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Aline Gouget and
               Thomas Icart and
               Pascal Paillier},
  title     = {Supplemental Access Control {(PACE} v2): Security Analysis of {PACE}
               Integrated Mapping},
  booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated
               to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  pages     = {207--232},
  year      = {2012},
  crossref  = {DBLP:conf/birthday/2012quisquater},
  url       = {https://doi.org/10.1007/978-3-642-28368-0_15},
  doi       = {10.1007/978-3-642-28368-0_15},
  timestamp = {Tue, 23 May 2017 01:06:48 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/birthday/CoronGIP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ClavierFTP12,
  author    = {Christophe Clavier and
               Benoit Feix and
               Lo{\"{\i}}c Thierry and
               Pascal Paillier},
  title     = {Generating Provable Primes Efficiently on Embedded Devices},
  booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  pages     = {372--389},
  year      = {2012},
  crossref  = {DBLP:conf/pkc/2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8_22},
  doi       = {10.1007/978-3-642-30057-8_22},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/ClavierFTP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CanteautFNPRV12,
  author    = {Anne Canteaut and
               Thomas Fuhr and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Pascal Paillier and
               Jean{-}Ren{\'{e}} Reinhard and
               Marion Videau},
  title     = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based
               Hash Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {363},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/363},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CanteautFNPRV12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Paillier11,
  author    = {Pascal Paillier},
  title     = {Paillier Encryption and Signature Schemes},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {902--903},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_488},
  doi       = {10.1007/978-1-4419-5906-5_488},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/Paillier11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronGIP11,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Aline Gouget and
               Thomas Icart and
               Pascal Paillier},
  title     = {Supplemental Access Control {(PACE} v2): Security Analysis of {PACE}
               Integrated Mapping},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {58},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/058},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CoronGIP11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/CoronGPV10,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Aline Gouget and
               Pascal Paillier and
               Karine Villegas},
  title     = {{SPAKE:} {A} Single-Party Public-Key Authenticated Key Exchange Protocol
               for Contact-Less Applications},
  booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
               WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
               2010, Revised Selected Papers},
  pages     = {107--122},
  year      = {2010},
  crossref  = {DBLP:conf/fc/2010w},
  url       = {https://doi.org/10.1007/978-3-642-14992-4_11},
  doi       = {10.1007/978-3-642-14992-4_11},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/CoronGPV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronJKNP09,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Antoine Joux and
               Ilya Kizhvatov and
               David Naccache and
               Pascal Paillier},
  title     = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
               Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  pages     = {444--456},
  year      = {2009},
  crossref  = {DBLP:conf/ches/2009},
  url       = {https://doi.org/10.1007/978-3-642-04138-9_31},
  doi       = {10.1007/978-3-642-04138-9_31},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/CoronJKNP09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/host/CastagnosBCDGGPS09,
  author    = {Guilhem Castagnos and
               Alexandre Berzati and
               C{\'{e}}cile Canovas and
               Blandine Debraize and
               Louis Goubin and
               Aline Gouget and
               Pascal Paillier and
               Stephanie Salgado},
  title     = {Fault Analysis of Grain-128},
  booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
               {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings},
  pages     = {7--14},
  year      = {2009},
  crossref  = {DBLP:conf/host/2009},
  url       = {https://doi.org/10.1109/HST.2009.5225030},
  doi       = {10.1109/HST.2009.5225030},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/host/CastagnosBCDGGPS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09,
  author    = {Emmanuel Bresson and
               Anne Canteaut and
               Beno{\^{\i}}t Chevallier{-}Mames and
               Christophe Clavier and
               Thomas Fuhr and
               Aline Gouget and
               Thomas Icart and
               Jean{-}Fran{\c{c}}ois Misarsky and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Pascal Paillier and
               Thomas Pornin and
               Jean{-}Ren{\'{e}} Reinhard and
               C{\'{e}}line Thuillet and
               Marion Videau},
  title     = {Indifferentiability with Distinguishers: Why Shabal Does Not Require
               Ideal Ciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {199},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/199},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BressonCCCFGIMNPPRTV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronJKNP09,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Antoine Joux and
               Ilya Kizhvatov and
               David Naccache and
               Pascal Paillier},
  title     = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {309},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/309},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CoronJKNP09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBCKKLMNPS08,
  author    = {Michel Abdalla and
               Mihir Bellare and
               Dario Catalano and
               Eike Kiltz and
               Tadayoshi Kohno and
               Tanja Lange and
               John Malone{-}Lee and
               Gregory Neven and
               Pascal Paillier and
               Haixia Shi},
  title     = {Searchable Encryption Revisited: Consistency Properties, Relation
               to Anonymous IBE, and Extensions},
  journal   = {J. Cryptology},
  volume    = {21},
  number    = {3},
  pages     = {350--391},
  year      = {2008},
  url       = {https://doi.org/10.1007/s00145-007-9006-6},
  doi       = {10.1007/s00145-007-9006-6},
  timestamp = {Mon, 25 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/AbdallaBCKKLMNPS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BressonCCGPP08,
  author    = {Emmanuel Bresson and
               Beno{\^{\i}}t Chevallier{-}Mames and
               Christophe Clavier and
               Aline Gouget and
               Pascal Paillier and
               Thomas Peyrin},
  title     = {How to Use Merkle-Damg{\aa}rd - On the Security Relations between
               Signature Schemes and Their Inner Hash Functions},
  booktitle = {Provable Security, Second International Conference, ProvSec 2008,
               Shanghai, China, October 30 - November 1, 2008. Proceedings},
  pages     = {241--253},
  year      = {2008},
  crossref  = {DBLP:conf/provsec/2008},
  url       = {https://doi.org/10.1007/978-3-540-88733-1_17},
  doi       = {10.1007/978-3-540-88733-1_17},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/provsec/BressonCCGPP08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Paillier07,
  author    = {Pascal Paillier},
  title     = {Impossibility Proofs for {RSA} Signatures in the Standard Model},
  booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
               the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
               Proceedings},
  pages     = {31--48},
  year      = {2007},
  crossref  = {DBLP:conf/ctrsa/2007},
  url       = {https://doi.org/10.1007/11967668_3},
  doi       = {10.1007/11967668_3},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/Paillier07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pairing/DelerableePP07,
  author    = {C{\'{e}}cile Delerabl{\'{e}}e and
               Pascal Paillier and
               David Pointcheval},
  title     = {Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size
               Ciphertexts or Decryption Keys},
  booktitle = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
               Tokyo, Japan, July 2-4, 2007, Proceedings},
  pages     = {39--59},
  year      = {2007},
  crossref  = {DBLP:conf/pairing/2007},
  url       = {https://doi.org/10.1007/978-3-540-73489-5_4},
  doi       = {10.1007/978-3-540-73489-5_4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pairing/DelerableePP07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FuhrP07,
  author    = {Thomas Fuhr and
               Pascal Paillier},
  title     = {Decryptable Searchable Encryption},
  booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
               Australia, November 1-2, 2007, Proceedings},
  pages     = {228--236},
  year      = {2007},
  crossref  = {DBLP:conf/provsec/2007},
  url       = {https://doi.org/10.1007/978-3-540-75670-5_17},
  doi       = {10.1007/978-3-540-75670-5_17},
  timestamp = {Thu, 15 Jun 2017 21:42:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/provsec/FuhrP07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2007,
  editor    = {Pascal Paillier and
               Ingrid Verbauwhede},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
               Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4727},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74735-2},
  doi       = {10.1007/978-3-540-74735-2},
  isbn      = {978-3-540-74734-5},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PaillierV06,
  author    = {Pascal Paillier and
               Jorge Luis Villar},
  title     = {Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based
               Encryption},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  pages     = {252--266},
  year      = {2006},
  crossref  = {DBLP:conf/asiacrypt/2006},
  url       = {https://doi.org/10.1007/11935230_17},
  doi       = {10.1007/11935230_17},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/PaillierV06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeP06,
  author    = {Marc Joye and
               Pascal Paillier},
  title     = {Fast Generation of Prime Numbers on Portable Devices: An Update},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
               Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  pages     = {160--173},
  year      = {2006},
  crossref  = {DBLP:conf/ches/2006},
  url       = {https://doi.org/10.1007/11894063_13},
  doi       = {10.1007/11894063_13},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/JoyeP06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Chevallier-MamesPP06,
  author    = {Beno{\^{\i}}t Chevallier{-}Mames and
               Pascal Paillier and
               David Pointcheval},
  title     = {Encoding-Free ElGamal Encryption Without Random Oracles},
  booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference
               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
               April 24-26, 2006, Proceedings},
  pages     = {91--104},
  year      = {2006},
  crossref  = {DBLP:conf/pkc/2006},
  url       = {https://doi.org/10.1007/11745853_7},
  doi       = {10.1007/11745853_7},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/Chevallier-MamesPP06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PaillierV05,
  author    = {Pascal Paillier and
               Damien Vergnaud},
  title     = {Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Chennai, India, December 4-8, 2005, Proceedings},
  pages     = {1--20},
  year      = {2005},
  crossref  = {DBLP:conf/asiacrypt/2005},
  url       = {https://doi.org/10.1007/11593447_1},
  doi       = {10.1007/11593447_1},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/PaillierV05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LaguillaumiePV05,
  author    = {Fabien Laguillaumie and
               Pascal Paillier and
               Damien Vergnaud},
  title     = {Universally Convertible Directed Signatures},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Chennai, India, December 4-8, 2005, Proceedings},
  pages     = {682--701},
  year      = {2005},
  crossref  = {DBLP:conf/asiacrypt/2005},
  url       = {https://doi.org/10.1007/11593447_37},
  doi       = {10.1007/11593447_37},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/LaguillaumiePV05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePS05,
  author    = {Marc Joye and
               Pascal Paillier and
               Berry Schoenmakers},
  title     = {On Second-Order Differential Power Analysis},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
               Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  pages     = {293--308},
  year      = {2005},
  crossref  = {DBLP:conf/ches/2005},
  url       = {https://doi.org/10.1007/11545262_22},
  doi       = {10.1007/11545262_22},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/JoyePS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBCKKLMNPS05,
  author    = {Michel Abdalla and
               Mihir Bellare and
               Dario Catalano and
               Eike Kiltz and
               Tadayoshi Kohno and
               Tanja Lange and
               John Malone{-}Lee and
               Gregory Neven and
               Pascal Paillier and
               Haixia Shi},
  title     = {Searchable Encryption Revisited: Consistency Properties, Relation
               to Anonymous IBE, and Extensions},
  booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  pages     = {205--222},
  year      = {2005},
  crossref  = {DBLP:conf/crypto/2005},
  url       = {https://doi.org/10.1007/11535218_13},
  doi       = {10.1007/11535218_13},
  timestamp = {Mon, 25 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/AbdallaBCKKLMNPS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Paillier05,
  author    = {Pascal Paillier},
  title     = {Paillier Encryption and Signature Schemes},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_293},
  doi       = {10.1007/0-387-23483-7_293},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/Paillier05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCKKLMNPS05,
  author    = {Michel Abdalla and
               Mihir Bellare and
               Dario Catalano and
               Eike Kiltz and
               Tadayoshi Kohno and
               Tanja Lange and
               John Malone{-}Lee and
               Gregory Neven and
               Pascal Paillier and
               Haixia Shi},
  title     = {Searchable Encryption Revisited: Consistency Properties, Relation
               to Anonymous IBE, and Extensions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {254},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/254},
  timestamp = {Mon, 25 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AbdallaBCKKLMNPS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04,
  author    = {Beno{\^{\i}}t Chevallier{-}Mames and
               David Naccache and
               Pascal Paillier and
               David Pointcheval},
  title     = {How to Disembed a Program?},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
               Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  pages     = {441--454},
  year      = {2004},
  crossref  = {DBLP:conf/ches/2004},
  url       = {https://doi.org/10.1007/978-3-540-28632-5_32},
  doi       = {10.1007/978-3-540-28632-5_32},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/Chevallier-MamesNPP04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesNPP04,
  author    = {Beno{\^{\i}}t Chevallier{-}Mames and
               David Naccache and
               Pascal Paillier and
               David Pointcheval},
  title     = {How to Disembed a Program?},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {138},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/138},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/Chevallier-MamesNPP04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesJP03,
  author    = {Beno{\^{\i}}t Chevallier{-}Mames and
               Marc Joye and
               Pascal Paillier},
  title     = {Faster Double-Size Modular Multiplication from Euclidean Multipliers},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
               Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  pages     = {214--227},
  year      = {2003},
  crossref  = {DBLP:conf/ches/2003},
  url       = {https://doi.org/10.1007/10931455_18},
  doi       = {10.1007/10931455_18},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/Chevallier-MamesJP03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeP03,
  author    = {Marc Joye and
               Pascal Paillier},
  title     = {GCD-Free Algorithms for Computing Modular Inverses},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
               Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  pages     = {243--253},
  year      = {2003},
  crossref  = {DBLP:conf/ches/2003},
  url       = {https://doi.org/10.1007/978-3-540-45238-6_20},
  doi       = {10.1007/978-3-540-45238-6_20},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/JoyeP03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BrierNP03,
  author    = {Eric Brier and
               David Naccache and
               Pascal Paillier},
  title     = {Chemical Combinatorial Attacks on Keyboards},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {217},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/217},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BrierNP03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HandschuhNPT02,
  author    = {Helena Handschuh and
               David Naccache and
               Pascal Paillier and
               Christophe Tymen},
  title     = {Provably Secure Chipcard Personalization, or, How to Fool Malicious
               Insiders},
  booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application
               Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  year      = {2002},
  crossref  = {DBLP:conf/cardis/2002},
  url       = {http://www.usenix.org/publications/library/proceedings/cardis02/handschuh.html},
  timestamp = {Thu, 15 May 2014 18:36:25 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cardis/HandschuhNPT02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronJNP02,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Marc Joye and
               David Naccache and
               Pascal Paillier},
  title     = {Universal Padding Schemes for {RSA}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  pages     = {226--241},
  year      = {2002},
  crossref  = {DBLP:conf/crypto/2002},
  url       = {https://doi.org/10.1007/3-540-45708-9_15},
  doi       = {10.1007/3-540-45708-9_15},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/CoronJNP02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CoronHJPPT02,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Helena Handschuh and
               Marc Joye and
               Pascal Paillier and
               David Pointcheval and
               Christophe Tymen},
  title     = {{GEM:} {A} Generic Chosen-Ciphertext Secure Encryption Method},
  booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
               the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
               Proceedings},
  pages     = {263--276},
  year      = {2002},
  crossref  = {DBLP:conf/ctrsa/2002},
  url       = {https://doi.org/10.1007/3-540-45760-7_18},
  doi       = {10.1007/3-540-45760-7_18},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/CoronHJPPT02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronHJPPT02,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Helena Handschuh and
               Marc Joye and
               Pascal Paillier and
               David Pointcheval and
               Christophe Tymen},
  title     = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  booktitle = {Public Key Cryptography, 5th International Workshop on Practice and
               Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
               12-14, 2002, Proceedings},
  pages     = {17--33},
  year      = {2002},
  crossref  = {DBLP:conf/pkc/2002},
  url       = {https://doi.org/10.1007/3-540-45664-3_2},
  doi       = {10.1007/3-540-45664-3_2},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/CoronHJPPT02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2002,
  editor    = {David Naccache and
               Pascal Paillier},
  title     = {Public Key Cryptography, 5th International Workshop on Practice and
               Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
               12-14, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2274},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45664-3},
  doi       = {10.1007/3-540-45664-3},
  isbn      = {3-540-43168-3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronHJPPT02,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Helena Handschuh and
               Marc Joye and
               Pascal Paillier and
               David Pointcheval and
               Christophe Tymen},
  title     = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {11},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/011},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CoronHJPPT02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronJNP02,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Marc Joye and
               David Naccache and
               Pascal Paillier},
  title     = {Universal Padding Schemes for {RSA}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {115},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/115},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CoronJNP02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Paillier00,
  author    = {Pascal Paillier},
  title     = {Trapdooring Discrete Logarithms on Elliptic Curves over Rings},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  pages     = {573--584},
  year      = {2000},
  crossref  = {DBLP:conf/asiacrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44448-3_44},
  doi       = {10.1007/3-540-44448-3_44},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/Paillier00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePV00,
  author    = {Marc Joye and
               Pascal Paillier and
               Serge Vaudenay},
  title     = {Efficient Generation of Prime Numbers},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
               International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  pages     = {340--354},
  year      = {2000},
  crossref  = {DBLP:conf/ches/2000},
  url       = {https://doi.org/10.1007/3-540-44499-8_27},
  doi       = {10.1007/3-540-44499-8_27},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/JoyePV00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CoronJNP00,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Marc Joye and
               David Naccache and
               Pascal Paillier},
  title     = {New Attacks on PKCS{\#}1 v1.5 Encryption},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  pages     = {369--381},
  year      = {2000},
  crossref  = {DBLP:conf/eurocrypt/2000},
  url       = {https://doi.org/10.1007/3-540-45539-6_25},
  doi       = {10.1007/3-540-45539-6_25},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/CoronJNP00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PaillierP99,
  author    = {Pascal Paillier and
               David Pointcheval},
  title     = {Efficient Public-Key Cryptosystems Provably Secure Against Active
               Adversaries},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Singapore, November 14-18, 1999, Proceedings},
  pages     = {165--179},
  year      = {1999},
  crossref  = {DBLP:conf/asiacrypt/1999},
  url       = {https://doi.org/10.1007/978-3-540-48000-6_14},
  doi       = {10.1007/978-3-540-48000-6_14},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/PaillierP99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/HandschuhPS99,
  author    = {Helena Handschuh and
               Pascal Paillier and
               Jacques Stern},
  title     = {Probing Attacks on Tamper-Resistant Devices},
  booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop,
               CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  pages     = {303--315},
  year      = {1999},
  crossref  = {DBLP:conf/ches/1999},
  url       = {https://doi.org/10.1007/3-540-48059-5_26},
  doi       = {10.1007/3-540-48059-5_26},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/HandschuhPS99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Paillier99,
  author    = {Pascal Paillier},
  title     = {Public-Key Cryptosystems Based on Composite Degree Residuosity Classes},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  pages     = {223--238},
  year      = {1999},
  crossref  = {DBLP:conf/eurocrypt/99},
  url       = {https://doi.org/10.1007/3-540-48910-X_16},
  doi       = {10.1007/3-540-48910-X_16},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/Paillier99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PaillierY99,
  author    = {Pascal Paillier and
               Moti Yung},
  title     = {Self-Escrowed Public-Key Infrastructures},
  booktitle = {Information Security and Cryptology - ICISC'99, Second International
               Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  pages     = {257--268},
  year      = {1999},
  crossref  = {DBLP:conf/icisc/1999},
  url       = {https://doi.org/10.1007/10719994_20},
  doi       = {10.1007/10719994_20},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/PaillierY99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Paillier99,
  author    = {Pascal Paillier},
  title     = {A Trapdoor Permutation Equivalent to Factoring},
  booktitle = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  pages     = {219--222},
  year      = {1999},
  crossref  = {DBLP:conf/pkc/1999},
  url       = {https://doi.org/10.1007/3-540-49162-7_17},
  doi       = {10.1007/3-540-49162-7_17},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/Paillier99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Paillier99a,
  author    = {Pascal Paillier},
  title     = {Low-Cost Double-Size Modular Exponentiation or How to Stretch Your
               Cryptoprocessor},
  booktitle = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  pages     = {223--234},
  year      = {1999},
  crossref  = {DBLP:conf/pkc/1999},
  url       = {https://doi.org/10.1007/3-540-49162-7_18},
  doi       = {10.1007/3-540-49162-7_18},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/Paillier99a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Paillier99b,
  author    = {Pascal Paillier},
  title     = {Evaluating Differential Fault Analysis of Unknown Cryptosystems},
  booktitle = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  pages     = {235--244},
  year      = {1999},
  crossref  = {DBLP:conf/pkc/1999},
  url       = {https://doi.org/10.1007/3-540-49162-7_19},
  doi       = {10.1007/3-540-49162-7_19},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/Paillier99b},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HandschuhP98,
  author    = {Helena Handschuh and
               Pascal Paillier},
  title     = {Reducing the Collision Probability of Alleged Comp128},
  booktitle = {Smart Card Research and Applications, This International Conference,
               {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  pages     = {366--371},
  year      = {1998},
  crossref  = {DBLP:conf/cardis/1998},
  url       = {https://doi.org/10.1007/10721064_34},
  doi       = {10.1007/10721064_34},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cardis/HandschuhP98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HandschuhP98a,
  author    = {Helena Handschuh and
               Pascal Paillier},
  title     = {Smart Card Crypto-Coprocessors for Public-Key Cryptography},
  booktitle = {Smart Card Research and Applications, This International Conference,
               {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  pages     = {372--379},
  year      = {1998},
  crossref  = {DBLP:conf/cardis/1998},
  url       = {https://doi.org/10.1007/10721064_35},
  doi       = {10.1007/10721064_35},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cardis/HandschuhP98a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paillier97,
  author    = {Pascal Paillier},
  title     = {On Ideal Non-perfect Secret Sharing Schemes},
  booktitle = {Security Protocols, 5th International Workshop, Paris, France, April
               7-9, 1997, Proceedings},
  pages     = {207--216},
  year      = {1997},
  crossref  = {DBLP:conf/spw/1997},
  url       = {https://doi.org/10.1007/BFb0028171},
  doi       = {10.1007/BFb0028171},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/spw/Paillier97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2016,
  editor    = {Thomas Peyrin},
  title     = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9783},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-52993-5},
  doi       = {10.1007/978-3-662-52993-5},
  isbn      = {978-3-662-52992-8},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/daglib/0039026,
  editor    = {Kai Rannenberg and
               Jan Camenisch and
               Ahmad Sabouri},
  title     = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-14439-9},
  doi       = {10.1007/978-3-319-14439-9},
  isbn      = {978-3-319-14438-2},
  timestamp = {Tue, 16 May 2017 14:01:41 +0200},
  biburl    = {http://dblp.org/rec/bib/books/daglib/0039026},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2013w,
  editor    = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title     = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
               and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7862},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41320-9},
  doi       = {10.1007/978-3-642-41320-9},
  isbn      = {978-3-642-41319-3},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/2013w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2013,
  editor    = {Tanja Lange and
               Kristin E. Lauter and
               Petr Lisonek},
  title     = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
               Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8282},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-43414-7},
  doi       = {10.1007/978-3-662-43414-7},
  isbn      = {978-3-662-43413-0},
  timestamp = {Mon, 25 Sep 2017 10:36:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/apf/2012,
  editor    = {Bart Preneel and
               Demosthenes Ikonomou},
  title     = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF}
               2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8319},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54069-1},
  doi       = {10.1007/978-3-642-54069-1},
  isbn      = {978-3-642-54068-4},
  timestamp = {Tue, 23 May 2017 01:06:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/apf/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/birthday/2012quisquater,
  editor    = {David Naccache},
  title     = {Cryptography and Security: From Theory to Applications - Essays Dedicated
               to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series    = {Lecture Notes in Computer Science},
  volume    = {6805},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28368-0},
  doi       = {10.1007/978-3-642-28368-0},
  isbn      = {978-3-642-28367-3},
  timestamp = {Tue, 23 May 2017 01:06:48 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/birthday/2012quisquater},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2012,
  editor    = {Marc Fischlin and
               Johannes A. Buchmann and
               Mark Manulis},
  title     = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7293},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8},
  doi       = {10.1007/978-3-642-30057-8},
  isbn      = {978-3-642-30056-1},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2011,
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Encyclopedia of Cryptography and Security, 2nd Ed},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5},
  doi       = {10.1007/978-1-4419-5906-5},
  isbn      = {978-1-4419-5905-8},
  timestamp = {Tue, 16 May 2017 14:01:51 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2010w,
  editor    = {Radu Sion and
               Reza Curtmola and
               Sven Dietrich and
               Aggelos Kiayias and
               Josep M. Miret and
               Kazue Sako and
               Francesc Seb{\'{e}}},
  title     = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
               WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
               2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6054},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14992-4},
  doi       = {10.1007/978-3-642-14992-4},
  isbn      = {978-3-642-14991-7},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/2010w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2009,
  editor    = {Christophe Clavier and
               Kris Gaj},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
               Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5747},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04138-9},
  doi       = {10.1007/978-3-642-04138-9},
  isbn      = {978-3-642-04137-2},
  timestamp = {Sun, 21 May 2017 00:18:34 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/host/2009,
  editor    = {Mohammad Tehranipoor and
               Jim Plusquellic},
  title     = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
               {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5209455},
  isbn      = {978-1-4244-4805-0},
  timestamp = {Thu, 23 Oct 2014 17:07:54 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/host/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/provsec/2008,
  editor    = {Joonsang Baek and
               Feng Bao and
               Kefei Chen and
               Xuejia Lai},
  title     = {Provable Security, Second International Conference, ProvSec 2008,
               Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5324},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-88733-1},
  doi       = {10.1007/978-3-540-88733-1},
  isbn      = {978-3-540-88732-4},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/provsec/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2007,
  editor    = {Masayuki Abe},
  title     = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
               the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4377},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11967668},
  doi       = {10.1007/11967668},
  isbn      = {3-540-69327-0},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pairing/2007,
  editor    = {Tsuyoshi Takagi and
               Tatsuaki Okamoto and
               Eiji Okamoto and
               Takeshi Okamoto},
  title     = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
               Tokyo, Japan, July 2-4, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4575},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73489-5},
  doi       = {10.1007/978-3-540-73489-5},
  isbn      = {978-3-540-73488-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pairing/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/provsec/2007,
  editor    = {Willy Susilo and
               Joseph K. Liu and
               Yi Mu},
  title     = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
               Australia, November 1-2, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4784},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-75670-5},
  doi       = {10.1007/978-3-540-75670-5},
  isbn      = {978-3-540-75669-9},
  timestamp = {Thu, 15 Jun 2017 21:42:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/provsec/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2006,
  editor    = {Xuejia Lai and
               Kefei Chen},
  title     = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4284},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11935230},
  doi       = {10.1007/11935230},
  isbn      = {3-540-49475-8},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2006,
  editor    = {Louis Goubin and
               Mitsuru Matsui},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
               Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4249},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11894063},
  doi       = {10.1007/11894063},
  isbn      = {3-540-46559-6},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2006,
  editor    = {Moti Yung and
               Yevgeniy Dodis and
               Aggelos Kiayias and
               Tal Malkin},
  title     = {Public Key Cryptography - {PKC} 2006, 9th International Conference
               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
               April 24-26, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3958},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11745853},
  doi       = {10.1007/11745853},
  isbn      = {3-540-33851-9},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2005,
  editor    = {Bimal K. Roy},
  title     = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Chennai, India, December 4-8, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3788},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593447},
  doi       = {10.1007/11593447},
  isbn      = {3-540-30684-6},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2005,
  editor    = {Josyula R. Rao and
               Berk Sunar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
               Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3659},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11545262},
  doi       = {10.1007/11545262},
  isbn      = {3-540-28474-5},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2005,
  editor    = {Victor Shoup},
  title     = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3621},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11535218},
  doi       = {10.1007/11535218},
  isbn      = {3-540-28114-2},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2005,
  editor    = {Henk C. A. van Tilborg},
  title     = {Encyclopedia of Cryptography and Security},
  publisher = {Springer},
  year      = {2005},
  isbn      = {978-0-387-23473-1},
  timestamp = {Fri, 25 Nov 2011 17:44:27 +0100},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2004,
  editor    = {Marc Joye and
               Jean{-}Jacques Quisquater},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
               Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3156},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b99451},
  doi       = {10.1007/b99451},
  isbn      = {3-540-22666-4},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2003,
  editor    = {Colin D. Walter and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
               Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2779},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-45238-6},
  doi       = {10.1007/978-3-540-45238-6},
  isbn      = {3-540-40833-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cardis/2002,
  editor    = {Peter Honeyman},
  title     = {Proceedings of the Fifth Smart Card Research and Advanced Application
               Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  publisher = {{USENIX}},
  year      = {2002},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A192},
  isbn      = {1-931971-04-8},
  timestamp = {Thu, 15 May 2014 18:36:25 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cardis/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2002,
  editor    = {Moti Yung},
  title     = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2442},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45708-9},
  doi       = {10.1007/3-540-45708-9},
  isbn      = {3-540-44050-X},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2002,
  editor    = {Bart Preneel},
  title     = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
               the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2271},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45760-7},
  doi       = {10.1007/3-540-45760-7},
  isbn      = {3-540-43224-8},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2002,
  editor    = {David Naccache and
               Pascal Paillier},
  title     = {Public Key Cryptography, 5th International Workshop on Practice and
               Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
               12-14, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2274},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45664-3},
  doi       = {10.1007/3-540-45664-3},
  isbn      = {3-540-43168-3},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2000,
  editor    = {Tatsuaki Okamoto},
  title     = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1976},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44448-3},
  doi       = {10.1007/3-540-44448-3},
  isbn      = {3-540-41404-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2000,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
               International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1965},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44499-8},
  doi       = {10.1007/3-540-44499-8},
  isbn      = {3-540-41455-X},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2000,
  editor    = {Bart Preneel},
  title     = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1807},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-45539-6},
  doi       = {10.1007/3-540-45539-6},
  isbn      = {3-540-67517-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1999,
  editor    = {Kwok{-}Yan Lam and
               Eiji Okamoto and
               Chaoping Xing},
  title     = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Singapore, November 14-18, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1716},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/b72231},
  doi       = {10.1007/b72231},
  isbn      = {3-540-66666-4},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/1999,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems, First International Workshop,
               CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1717},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48059-5},
  doi       = {10.1007/3-540-48059-5},
  isbn      = {3-540-66646-X},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/99,
  editor    = {Jacques Stern},
  title     = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1592},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48910-X},
  doi       = {10.1007/3-540-48910-X},
  isbn      = {3-540-65889-0},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/1999,
  editor    = {JooSeok Song},
  title     = {Information Security and Cryptology - ICISC'99, Second International
               Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1787},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/10719994},
  doi       = {10.1007/10719994},
  isbn      = {3-540-67380-6},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/1999,
  editor    = {Hideki Imai and
               Yuliang Zheng},
  title     = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1560},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-49162-7},
  doi       = {10.1007/3-540-49162-7},
  isbn      = {3-540-65644-8},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cardis/1998,
  editor    = {Jean{-}Jacques Quisquater and
               Bruce Schneier},
  title     = {Smart Card Research and Applications, This International Conference,
               {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1820},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/10721064},
  doi       = {10.1007/10721064},
  isbn      = {3-540-67923-5},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cardis/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/spw/1997,
  editor    = {Bruce Christianson and
               Bruno Crispo and
               T. Mark A. Lomas and
               Michael Roe},
  title     = {Security Protocols, 5th International Workshop, Paris, France, April
               7-9, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1361},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0028154},
  doi       = {10.1007/BFb0028154},
  isbn      = {3-540-64040-1},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/spw/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier