BibTeX records: Matthew J. B. Robshaw

download as .bib file

@inproceedings{DBLP:conf/acns/BlackburnR16,
  author       = {Simon R. Blackburn and
                  Matthew J. B. Robshaw},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {On the Security of the Algebraic Eraser Tag Authentication Protocol},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_1},
  doi          = {10.1007/978-3-319-39555-5\_1},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BlackburnR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-1,
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4},
  doi          = {10.1007/978-3-662-53018-4},
  isbn         = {978-3-662-53017-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2016-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-2,
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5},
  doi          = {10.1007/978-3-662-53008-5},
  isbn         = {978-3-662-53007-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-3,
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3},
  doi          = {10.1007/978-3-662-53015-3},
  isbn         = {978-3-662-53014-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2016-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlackburnR16,
  author       = {Simon R. Blackburn and
                  Matthew J. B. Robshaw},
  title        = {On the security of the Algebraic Eraser tag authentication protocol},
  journal      = {CoRR},
  volume       = {abs/1602.00860},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.00860},
  eprinttype    = {arXiv},
  eprint       = {1602.00860},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlackburnR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnR16,
  author       = {Simon R. Blackburn and
                  Matthew J. B. Robshaw},
  title        = {On the Security of the Algebraic Eraser Tag Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BatinaR15,
  author       = {Lejla Batina and
                  Matthew J. B. Robshaw},
  title        = {Introduction to the {CHES} 2014 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {71--72},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0098-x},
  doi          = {10.1007/S13389-015-0098-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BatinaR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/CidFPR15,
  author       = {Carlos Cid and
                  Lo{\"{\i}}c Ferreira and
                  Gordon Procter and
                  Matthew J. B. Robshaw},
  editor       = {Stefan Mangard and
                  Patrick Schaumont},
  title        = {Algebraic Cryptanalysis and {RFID} Authentication},
  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 11th
                  International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24,
                  2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9440},
  pages        = {104--121},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24837-0\_7},
  doi          = {10.1007/978-3-319-24837-0\_7},
  timestamp    = {Mon, 15 Jun 2020 17:08:11 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/CidFPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-1,
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6},
  doi          = {10.1007/978-3-662-47989-6},
  isbn         = {978-3-662-47988-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2015-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7},
  doi          = {10.1007/978-3-662-48000-7},
  isbn         = {978-3-662-47999-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2015-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2014,
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3},
  doi          = {10.1007/978-3-662-44709-3},
  isbn         = {978-3-662-44708-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PoschmannR12,
  author       = {Axel Poschmann and
                  Matthew J. B. Robshaw},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {On Area, Time, and the Right Trade-Off},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_30},
  doi          = {10.1007/978-3-642-31448-3\_30},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PoschmannR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CanardFR12,
  author       = {S{\'{e}}bastien Canard and
                  Lo{\"{\i}}c Ferreira and
                  Matthew Robshaw},
  editor       = {Stefan Mangard},
  title        = {Improved (and Practical) Public-Key Authentication for {UHF} {RFID}
                  Tags},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {46--61},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_4},
  doi          = {10.1007/978-3-642-37288-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/CanardFR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001PPR12,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Matthew J. B. Robshaw},
  title        = {The {LED} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001PPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0028270,
  author       = {Lars R. Knudsen and
                  Matthew Robshaw},
  title        = {The Block Cipher Companion},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-17342-4},
  doi          = {10.1007/978-3-642-17342-4},
  isbn         = {978-3-642-17341-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0028270.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuoPPR11,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Matthew J. B. Robshaw},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {The {LED} Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {326--341},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_22},
  doi          = {10.1007/978-3-642-23951-9\_22},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GuoPPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NguyenRW11,
  author       = {Phuong Ha Nguyen and
                  Matthew J. B. Robshaw and
                  Huaxiong Wang},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {On Related-Key Attacks and {KASUMI:} The Case of {A5/3}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {146--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_12},
  doi          = {10.1007/978-3-642-25578-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NguyenRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Robshaw11,
  author       = {Matthew J. B. Robshaw},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {One-Way Function},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {887--888},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_467},
  doi          = {10.1007/978-1-4419-5906-5\_467},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Robshaw11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Robshaw11a,
  author       = {Matthew J. B. Robshaw},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Trapdoor One-Way Function},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1317--1318},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_482},
  doi          = {10.1007/978-1-4419-5906-5\_482},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Robshaw11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cdt/ONeillR10,
  author       = {M{\'{a}}ire O'Neill and
                  Matthew J. B. Robshaw},
  title        = {Low-cost digital signature architecture suitable for radio frequency
                  identification tags},
  journal      = {{IET} Comput. Digit. Tech.},
  volume       = {4},
  number       = {1},
  pages        = {14--26},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-cdt.2008.0165},
  doi          = {10.1049/IET-CDT.2008.0165},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-cdt/ONeillR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/PoschmannRVP10,
  author       = {Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Frank Vater and
                  Christof Paar},
  title        = {Lightweight Cryptography and {RFID:} Tackling the Hidden Overhead},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {4},
  number       = {2},
  pages        = {98--116},
  year         = {2010},
  url          = {https://doi.org/10.3837/tiis.2010.04.002},
  doi          = {10.3837/TIIS.2010.04.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/PoschmannRVP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/EtrogR10,
  author       = {Jonathan Etrog and
                  Matthew J. B. Robshaw},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {On Unbiased Linear Approximations},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {74--86},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_5},
  doi          = {10.1007/978-3-642-14081-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/EtrogR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KnudsenLPR10,
  author       = {Lars R. Knudsen and
                  Gregor Leander and
                  Axel Poschmann and
                  Matthew J. B. Robshaw},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {PRINTcipher: {A} Block Cipher for IC-Printing},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_2},
  doi          = {10.1007/978-3-642-15031-9\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KnudsenLPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BenadjilaBGR09,
  author       = {Ryad Benadjila and
                  Olivier Billet and
                  Shay Gueron and
                  Matthew J. B. Robshaw},
  editor       = {Mitsuru Matsui},
  title        = {The Intel {AES} Instructions Set and the {SHA-3} Candidates},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {162--178},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_10},
  doi          = {10.1007/978-3-642-10366-7\_10},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BenadjilaBGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PoschmannRVP09,
  author       = {Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Frank Vater and
                  Christof Paar},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Lightweight Cryptography and {RFID:} Tackling the Hidden Overheads},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_10},
  doi          = {10.1007/978-3-642-14423-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PoschmannRVP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BilletRSY08,
  author       = {Olivier Billet and
                  Matthew J. B. Robshaw and
                  Yannick Seurin and
                  Yiqun Lisa Yin},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Looking Back at a New Hash Function},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_18},
  doi          = {10.1007/978-3-540-70500-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BilletRSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/KasperRBRRS08,
  author       = {Emilia K{\"{a}}sper and
                  Vincent Rijmen and
                  Tor E. Bj{\o}rstad and
                  Christian Rechberger and
                  Matthew J. B. Robshaw and
                  Gautham Sekar},
  editor       = {Serge Vaudenay},
  title        = {Correlated Keystreams in Moustique},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {246--257},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_17},
  doi          = {10.1007/978-3-540-68164-9\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/KasperRBRRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovLPPRS08,
  author       = {Andrey Bogdanov and
                  Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Hash Functions and {RFID} Tags: Mind the Gap},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {283--299},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_18},
  doi          = {10.1007/978-3-540-85053-3\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovLPPRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Nigel P. Smart},
  title        = {HB\({}^{\mbox{{\#}}}\): Increasing the Security and Efficiency of
                  HB\({}^{\mbox{+}}\)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {361--378},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_21},
  doi          = {10.1007/978-3-540-78967-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Gene Tsudik},
  title        = {Good Variants of HB\({}^{\mbox{+}}\) Are Hard to Find},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_12},
  doi          = {10.1007/978-3-540-85230-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {How to Encrypt with the {LPN} Problem},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {679--690},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_55},
  doi          = {10.1007/978-3-540-70583-3\_55},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/EtrogR08,
  author       = {Jonathan Etrog and
                  Matthew J. B. Robshaw},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {The Cryptanalysis of Reduced-Round {SMS4}},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {51--65},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_4},
  doi          = {10.1007/978-3-642-04159-4\_4},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/EtrogR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Robshaw08,
  author       = {Matthew Robshaw},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {The eSTREAM Project},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {1--6},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_1},
  doi          = {10.1007/978-3-540-68351-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Robshaw08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/4986,
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3},
  doi          = {10.1007/978-3-540-68351-3},
  isbn         = {978-3-540-68350-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/4986.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  title        = {HB{\#}: Increasing the Security and Efficiency of {HB+}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BilletRP07,
  author       = {Olivier Billet and
                  Matthew J. B. Robshaw and
                  Thomas Peyrin},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {On Building Hash Functions from Multivariate Quadratic Equations},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {82--95},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_7},
  doi          = {10.1007/978-3-540-73458-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BilletRP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Yannick Seurin and
                  C. Vikkelsoe},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{PRESENT:} An Ultra-Lightweight Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {450--466},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_31},
  doi          = {10.1007/978-3-540-74735-2\_31},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/McLooneR07,
  author       = {M{\'{a}}ire McLoone and
                  Matthew J. B. Robshaw},
  editor       = {Masayuki Abe},
  title        = {Public Key Cryptography and {RFID} Tags},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {372--384},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_24},
  doi          = {10.1007/11967668\_24},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/McLooneR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/McLooneR07,
  author       = {M{\'{a}}ire McLoone and
                  Matthew J. B. Robshaw},
  title        = {New Architectures for Low-Cost Public Key Cryptography on {RFID} Tags},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20
                  May 2007, New Orleans, Louisiana, {USA}},
  pages        = {1827--1830},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCAS.2007.378269},
  doi          = {10.1109/ISCAS.2007.378269},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/McLooneR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0019058,
  author       = {Carlos Cid and
                  Sean Murphy and
                  Matthew J. B. Robshaw},
  title        = {Algebraic aspects of the advanced encryption standard},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36842-9},
  doi          = {10.1007/978-0-387-36842-9},
  isbn         = {978-0-387-24363-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0019058.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Robshaw06,
  author       = {Matthew J. B. Robshaw},
  title        = {An overview of {RFID} tags and new cryptographic developments},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {82--88},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.006},
  doi          = {10.1016/J.ISTR.2006.03.006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Robshaw06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PeyrinGMR06,
  author       = {Thomas Peyrin and
                  Henri Gilbert and
                  Fr{\'{e}}d{\'{e}}ric Muller and
                  Matthew J. B. Robshaw},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Combining Compression Functions and Block Cipher-Based Hash Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {315--331},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_21},
  doi          = {10.1007/11935230\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PeyrinGMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/FischerMBBR06,
  author       = {Simon Fischer and
                  Willi Meier and
                  C{\^{o}}me Berbain and
                  Jean{-}Fran{\c{c}}ois Biasse and
                  Matthew J. B. Robshaw},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Non-randomness in eSTREAM Candidates Salsa20 and {TSC-4}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {2--16},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_2},
  doi          = {10.1007/11941378\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/FischerMBBR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/Robshaw06,
  author       = {Matthew J. B. Robshaw},
  editor       = {Phong Q. Nguyen},
  title        = {Searching for Compact Algorithms: cgen},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {37--49},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_3},
  doi          = {10.1007/11958239\_3},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/Robshaw06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2006,
  editor       = {Matthew J. B. Robshaw},
  title        = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313},
  doi          = {10.1007/11799313},
  isbn         = {3-540-36597-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egc/LimR05,
  author       = {Hoon Wei Lim and
                  Matthew J. B. Robshaw},
  editor       = {Peter M. A. Sloot and
                  Alfons G. Hoekstra and
                  Thierry Priol and
                  Alexander Reinefeld and
                  Marian Bubak},
  title        = {A Dynamic Key Infrastructure for Grid},
  booktitle    = {Advances in Grid Computing - {EGC} 2005, European Grid Conference,
                  Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3470},
  pages        = {255--264},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11508380\_27},
  doi          = {10.1007/11508380\_27},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/egc/LimR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CidMR05,
  author       = {Carlos Cid and
                  Sean Murphy and
                  Matthew J. B. Robshaw},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Small Scale Variants of the {AES}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {145--162},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_10},
  doi          = {10.1007/11502760\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CidMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CidMR05,
  author       = {Carlos Cid and
                  Sean Murphy and
                  Matthew J. B. Robshaw},
  editor       = {Nigel P. Smart},
  title        = {An Algebraic Framework for Cipher Embeddings},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {278--289},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_19},
  doi          = {10.1007/11586821\_19},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/CidMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JonssonR05,
  author       = {Jakob Jonsson and
                  Matthew J. B. Robshaw},
  editor       = {Serge Vaudenay},
  title        = {Securing {RSA-KEM} via the {AES}},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_4},
  doi          = {10.1007/978-3-540-30580-4\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JonssonR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Robshaw05,
  author       = {Matthew J. B. Robshaw},
  editor       = {Henk C. A. van Tilborg},
  title        = {One-Way Function},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_287},
  doi          = {10.1007/0-387-23483-7\_287},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Robshaw05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Robshaw05a,
  author       = {Matthew J. B. Robshaw},
  editor       = {Henk C. A. van Tilborg},
  title        = {Trapdoor One-Way Function},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_436},
  doi          = {10.1007/0-387-23483-7\_436},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Robshaw05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertRS05,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Herv{\'{e}} Sibert},
  title        = {An Active Attack Against {HB+} - {A} Provably Secure Lightweight Authentication
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/DobbertinKR04,
  author       = {Hans Dobbertin and
                  Lars R. Knudsen and
                  Matthew J. B. Robshaw},
  editor       = {Hans Dobbertin and
                  Vincent Rijmen and
                  Aleksandra Sowa},
  title        = {The Cryptanalysis of the {AES} - {A} Brief Survey},
  booktitle    = {Advanced Encryption Standard - AES, 4th International Conference,
                  {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3373},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11506447\_1},
  doi          = {10.1007/11506447\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/DobbertinKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/LimR04,
  author       = {Hoon Wei Lim and
                  Matthew J. B. Robshaw},
  editor       = {Marian Bubak and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {On Identity-Based Cryptography and Grid Computing},
  booktitle    = {Computational Science - {ICCS} 2004, 4th International Conference,
                  Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3036},
  pages        = {474--477},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24685-5\_69},
  doi          = {10.1007/978-3-540-24685-5\_69},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/LimR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/LeeSYRR04,
  author       = {Ruby B. Lee and
                  Zhijie Shi and
                  Yiqun Lisa Yin and
                  Ronald L. Rivest and
                  Matthew J. B. Robshaw},
  title        = {On Permutation Operations in Cipher Design},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {569--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286714},
  doi          = {10.1109/ITCC.2004.1286714},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/LeeSYRR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-8/CiechanowiczMPR03,
  author       = {Chez Ciechanowicz and
                  Keith M. Martin and
                  Fred Piper and
                  Matthew J. B. Robshaw},
  editor       = {Cynthia E. Irvine and
                  Helen L. Armstrong},
  title        = {Ten Years of Information Security Masters Programmes},
  booktitle    = {Security Education and Critical Infrastructures, {IFIP} {TC11} / {WG11.8}
                  Third Annual World Conference on Information Security Education (WISE3),
                  June 26-28, 2003, Monterey, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {253},
  pages        = {215--230},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Thu, 06 May 2004 14:39:20 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-8/CiechanowiczMPR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MurphyR02,
  author       = {Sean Murphy and
                  Matthew J. B. Robshaw},
  title        = {Key-Dependent S-Boxes and Differential Cryptanalysis},
  journal      = {Des. Codes Cryptogr.},
  volume       = {27},
  number       = {3},
  pages        = {229--255},
  year         = {2002},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MurphyR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MurphyR02,
  author       = {Sean Murphy and
                  Matthew J. B. Robshaw},
  editor       = {Moti Yung},
  title        = {Essential Algebraic Structure within the {AES}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_1},
  doi          = {10.1007/3-540-45708-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MurphyR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HandschuhKR01,
  author       = {Helena Handschuh and
                  Lars R. Knudsen and
                  Matthew J. B. Robshaw},
  editor       = {David Naccache},
  title        = {Analysis of {SHA-1} in Encryption Mode},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {70--83},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_7},
  doi          = {10.1007/3-540-45353-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HandschuhKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/RivestRY00,
  author       = {Ronald L. Rivest and
                  Matthew J. B. Robshaw and
                  Yiqun Lisa Yin},
  title        = {{RC6} as the {AES}},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {337--342},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/RivestRY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KnudsenRW99,
  author       = {Lars R. Knudsen and
                  Matthew J. B. Robshaw and
                  David A. Wagner},
  editor       = {Michael J. Wiener},
  title        = {Truncated Differentials and Skipjack},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_11},
  doi          = {10.1007/3-540-48405-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KnudsenRW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ContiniRRY99,
  author       = {Scott Contini and
                  Ronald L. Rivest and
                  Matthew J. B. Robshaw and
                  Yiqun Lisa Yin},
  editor       = {Lars R. Knudsen},
  title        = {Improved Analysis of Some Simplified Variants of {RC6}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_1},
  doi          = {10.1007/3-540-48519-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ContiniRRY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenRRR98,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen and
                  Ronald L. Rivest and
                  Matthew J. B. Robshaw},
  editor       = {Serge Vaudenay},
  title        = {On the Design and Security of {RC2}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {206--221},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_14},
  doi          = {10.1007/3-540-69710-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenRRR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KnudsenR96,
  author       = {Lars R. Knudsen and
                  Matthew J. B. Robshaw},
  editor       = {Ueli M. Maurer},
  title        = {Non-Linear Approximations in Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {224--236},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_20},
  doi          = {10.1007/3-540-68339-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KnudsenR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/PatersonR95,
  author       = {Kenneth G. Paterson and
                  Matthew J. B. Robshaw},
  title        = {Storage efficient decoding for a class of binary be Bruijn sequences},
  journal      = {Discret. Math.},
  volume       = {138},
  number       = {1-3},
  pages        = {327--341},
  year         = {1995},
  url          = {https://doi.org/10.1016/0012-365X(94)00215-5},
  doi          = {10.1016/0012-365X(94)00215-5},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/PatersonR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Robshaw94,
  author       = {Matthew J. B. Robshaw},
  title        = {On Evaluating the Linear Complexity of a Sequence of Least Period
                  2\({}^{\mbox{n}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {4},
  number       = {3},
  pages        = {263--269},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF01388455},
  doi          = {10.1007/BF01388455},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Robshaw94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KaliskiR94,
  author       = {Burton S. Kaliski Jr. and
                  Matthew J. B. Robshaw},
  editor       = {Yvo Desmedt},
  title        = {Linear Cryptanalysis Using Multiple Approximations},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {26--39},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_4},
  doi          = {10.1007/3-540-48658-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KaliskiR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KaliskiR94,
  author       = {Burton S. Kaliski Jr. and
                  Matthew J. B. Robshaw},
  editor       = {Bart Preneel},
  title        = {Linear Cryptanalysis Using Multiple Approximations and {FEAL}},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_19},
  doi          = {10.1007/3-540-60590-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KaliskiR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KaliskiR93,
  author       = {Burton S. Kaliski Jr. and
                  Matthew J. B. Robshaw},
  editor       = {Ross J. Anderson},
  title        = {Fast Block Cipher Proposal},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {33--40},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_3},
  doi          = {10.1007/3-540-58108-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KaliskiR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics