BibTeX records: Santanu Sarkar

download as .bib file

@article{DBLP:journals/ccds/SarkarDAM17,
  author    = {Santanu Sarkar and
               Prakash Dey and
               Avishek Adhikari and
               Subhamoy Maitra},
  title     = {Probabilistic signature based generalized framework for differential
               fault analysis of stream ciphers},
  journal   = {Cryptography and Communications},
  volume    = {9},
  number    = {4},
  pages     = {523--543},
  year      = {2017},
  url       = {http://dx.doi.org/10.1007/s12095-016-0197-2},
  doi       = {10.1007/s12095-016-0197-2},
  timestamp = {Tue, 28 Mar 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ccds/SarkarDAM17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/SarkarV17,
  author    = {Santanu Sarkar and
               Ayineedi Venkateswarlu},
  title     = {Revisiting (nested) Roos bias in {RC4} key scheduling algorithm},
  journal   = {Des. Codes Cryptography},
  volume    = {82},
  number    = {1-2},
  pages     = {131--148},
  year      = {2017},
  url       = {http://dx.doi.org/10.1007/s10623-016-0219-2},
  doi       = {10.1007/s10623-016-0219-2},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dcc/SarkarV17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/SarkarMB17,
  author    = {Santanu Sarkar and
               Subhamoy Maitra and
               Anubhab Baksi},
  title     = {Observing biases in the state: case studies with Trivium and Trivia-SC},
  journal   = {Des. Codes Cryptography},
  volume    = {82},
  number    = {1-2},
  pages     = {351--375},
  year      = {2017},
  url       = {http://dx.doi.org/10.1007/s10623-016-0211-x},
  doi       = {10.1007/s10623-016-0211-x},
  timestamp = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dcc/SarkarMB17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dm/VenkateswarluSA17,
  author    = {Ayineedi Venkateswarlu and
               Santanu Sarkar and
               Sai Mali Ananthanarayanan},
  title     = {On acyclic edge-coloring of complete bipartite graphs},
  journal   = {Discrete Mathematics},
  volume    = {340},
  number    = {3},
  pages     = {481--493},
  year      = {2017},
  url       = {http://dx.doi.org/10.1016/j.disc.2016.08.026},
  doi       = {10.1016/j.disc.2016.08.026},
  timestamp = {Thu, 29 Dec 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dm/VenkateswarluSA17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DeyS17,
  author    = {Sabyasachi Dey and
               Santanu Sarkar},
  title     = {Cryptanalysis of full round Fruit},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {87},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/087},
  timestamp = {Tue, 21 Feb 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/DeyS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dam/Sarkar16,
  author    = {Santanu Sarkar},
  title     = {Revisiting Prime Power {RSA}},
  journal   = {Discrete Applied Mathematics},
  volume    = {203},
  pages     = {127--133},
  year      = {2016},
  url       = {http://dx.doi.org/10.1016/j.dam.2015.10.003},
  doi       = {10.1016/j.dam.2015.10.003},
  timestamp = {Tue, 05 Apr 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dam/Sarkar16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dm/VenkateswarluS16,
  author    = {Ayineedi Venkateswarlu and
               Santanu Sarkar},
  title     = {On acyclic edge-coloring of the complete bipartite graphs K\({}_{\mbox{2p-1,
               2p-1}}\) for odd prime p},
  journal   = {Discrete Mathematics},
  volume    = {339},
  number    = {1},
  pages     = {72--77},
  year      = {2016},
  url       = {http://dx.doi.org/10.1016/j.disc.2015.07.010},
  doi       = {10.1016/j.disc.2015.07.010},
  timestamp = {Mon, 16 Nov 2015 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dm/VenkateswarluS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isw/XuHSZHP16,
  author    = {Jun Xu and
               Lei Hu and
               Santanu Sarkar and
               Xiaona Zhang and
               Zhangjie Huang and
               Liqiang Peng},
  title     = {Cryptanalysis of Multi-Prime {\textbackslash}varPhi -Hiding Assumption},
  booktitle = {Information Security - 19th International Conference, {ISC} 2016,
               Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  pages     = {440--453},
  year      = {2016},
  crossref  = {DBLP:conf/isw/2016},
  url       = {http://dx.doi.org/10.1007/978-3-319-45871-7_26},
  doi       = {10.1007/978-3-319-45871-7_26},
  timestamp = {Mon, 29 Aug 2016 09:21:11 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isw/XuHSZHP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sscc/DeyRSA16,
  author    = {Prakash Dey and
               Raghvendra Singh Rohit and
               Santanu Sarkar and
               Avishek Adhikari},
  title     = {Differential Fault Analysis on Tiaoxin and {AEGIS} Family of Ciphers},
  booktitle = {Security in Computing and Communications - 4th International Symposium,
               {SSCC} 2016, Jaipur, India, September 21-24, 2016, Proceedings},
  pages     = {74--86},
  year      = {2016},
  crossref  = {DBLP:conf/sscc/2016},
  url       = {http://dx.doi.org/10.1007/978-981-10-2738-3_7},
  doi       = {10.1007/978-981-10-2738-3_7},
  timestamp = {Tue, 20 Sep 2016 10:07:13 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sscc/DeyRSA16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/XuHSZHP16,
  author    = {Jun Xu and
               Lei Hu and
               Santanu Sarkar and
               Xiaona Zhang and
               Zhangjie Huang and
               Liqiang Peng},
  title     = {Cryptanalysis of Multi-Prime {\(\Phi\)}-Hiding Assumption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {155},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/155},
  timestamp = {Sun, 13 Mar 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/XuHSZHP16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ccds/Sarkar15,
  author    = {Santanu Sarkar},
  title     = {Further non-randomness in RC4, {RC4A} and {VMPC}},
  journal   = {Cryptography and Communications},
  volume    = {7},
  number    = {3},
  pages     = {317--330},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/s12095-014-0119-0},
  doi       = {10.1007/s12095-014-0119-0},
  timestamp = {Mon, 13 Apr 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ccds/Sarkar15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/SarkarGPM15,
  author    = {Santanu Sarkar and
               Sourav Sen Gupta and
               Goutam Paul and
               Subhamoy Maitra},
  title     = {Proving TLS-attack related open biases of {RC4}},
  journal   = {Des. Codes Cryptography},
  volume    = {77},
  number    = {1},
  pages     = {231--253},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/s10623-014-0003-0},
  doi       = {10.1007/s10623-014-0003-0},
  timestamp = {Mon, 31 Aug 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dcc/SarkarGPM15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jce/BanikMS15,
  author    = {Subhadeep Banik and
               Subhamoy Maitra and
               Santanu Sarkar},
  title     = {Improved differential fault attack on {MICKEY} 2.0},
  journal   = {J. Cryptographic Engineering},
  volume    = {5},
  number    = {1},
  pages     = {13--29},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/s13389-014-0083-9},
  doi       = {10.1007/s13389-014-0083-9},
  timestamp = {Thu, 26 Mar 2015 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jce/BanikMS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/paapp/NandiNRS15,
  author    = {Mrinal Nandi and
               Amiya Nayak and
               Bimal K. Roy and
               Santanu Sarkar},
  title     = {Hypothesis testing and decision theoretic approach for fault detection
               in wireless sensor networks},
  journal   = {{IJPEDS}},
  volume    = {30},
  number    = {4},
  pages     = {262--285},
  year      = {2015},
  url       = {http://dx.doi.org/10.1080/17445760.2014.910514},
  doi       = {10.1080/17445760.2014.910514},
  timestamp = {Sun, 12 Jul 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/paapp/NandiNRS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/SarkarBM15,
  author    = {Santanu Sarkar and
               Subhadeep Banik and
               Subhamoy Maitra},
  title     = {Differential Fault Attack against Grain Family with Very Few Faults
               and Minimal Assumptions},
  journal   = {{IEEE} Trans. Computers},
  volume    = {64},
  number    = {6},
  pages     = {1647--1657},
  year      = {2015},
  url       = {http://dx.doi.org/10.1109/TC.2014.2339854},
  doi       = {10.1109/TC.2014.2339854},
  timestamp = {Tue, 22 Dec 2015 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/SarkarBM15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Sarkar15,
  author    = {Santanu Sarkar},
  title     = {A New Distinguisher on Grain v1 for 106 Rounds},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  pages     = {334--344},
  year      = {2015},
  crossref  = {DBLP:conf/iciss/2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-26961-0_20},
  doi       = {10.1007/978-3-319-26961-0_20},
  timestamp = {Thu, 17 Dec 2015 15:53:05 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iciss/Sarkar15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PengHLSXH15,
  author    = {Liqiang Peng and
               Lei Hu and
               Yao Lu and
               Santanu Sarkar and
               Jun Xu and
               Zhangjie Huang},
  title     = {Cryptanalysis of Variants of {RSA} with Multiple Small Secret Exponents},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
               on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  pages     = {105--123},
  year      = {2015},
  crossref  = {DBLP:conf/indocrypt/2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-26617-6_6},
  doi       = {10.1007/978-3-319-26617-6_6},
  timestamp = {Mon, 30 Nov 2015 15:50:36 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/PengHLSXH15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/VenkateswarluSM15,
  author    = {Ayineedi Venkateswarlu and
               Santanu Sarkar and
               A. Sai Mali},
  title     = {On Acyclic Edge-Coloring of Complete Bipartite Graphs},
  journal   = {CoRR},
  volume    = {abs/1503.03283},
  year      = {2015},
  url       = {http://arxiv.org/abs/1503.03283},
  timestamp = {Thu, 09 Apr 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/VenkateswarluSM15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BaksiMS15,
  author    = {Anubhab Baksi and
               Subhamoy Maitra and
               Santanu Sarkar},
  title     = {New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube
               Testers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {223},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/223},
  timestamp = {Fri, 20 Mar 2015 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BaksiMS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MaitraSBD15,
  author    = {Subhamoy Maitra and
               Santanu Sarkar and
               Anubhab Baksi and
               Pramit Dey},
  title     = {Key Recovery from State Information of Sprout: Application to Cryptanalysis
               and Fault Attack},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {236},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/236},
  timestamp = {Fri, 20 Mar 2015 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/MaitraSBD15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar15,
  author    = {Santanu Sarkar},
  title     = {A New Distinguisher on Grain v1 for 106 rounds},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {340},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/340},
  timestamp = {Fri, 24 Apr 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Sarkar15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SarkarDAM15,
  author    = {Santanu Sarkar and
               Prakash Dey and
               Avishek Adhikari and
               Subhamoy Maitra},
  title     = {Probabilistic Signature Based Framework for Differential Fault Analysis
               of Stream Ciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {508},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/508},
  timestamp = {Fri, 26 Jun 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SarkarDAM15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar15a,
  author    = {Santanu Sarkar},
  title     = {Revisiting Prime Power {RSA}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {774},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/774},
  timestamp = {Fri, 28 Aug 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Sarkar15a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar15b,
  author    = {Santanu Sarkar},
  title     = {Modular Inversion Hidden Number Problem - Correction and Improvements},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {778},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/778},
  timestamp = {Fri, 28 Aug 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Sarkar15b},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/Sarkar14,
  author    = {Santanu Sarkar},
  title     = {Small secret exponent attack on {RSA} variant with modulus N=p\({}^{\mbox{r}}\)q},
  journal   = {Des. Codes Cryptography},
  volume    = {73},
  number    = {2},
  pages     = {383--392},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/s10623-014-9928-6},
  doi       = {10.1007/s10623-014-9928-6},
  timestamp = {Mon, 28 Jul 2014 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dcc/Sarkar14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijdsn/NandiDRS14,
  author    = {Mrinal Nandi and
               Anup Dewanji and
               Bimal K. Roy and
               Santanu Sarkar},
  title     = {Model Selection Approach for Distributed Fault Detection in Wireless
               Sensor Networks},
  journal   = {{IJDSN}},
  volume    = {10},
  year      = {2014},
  url       = {http://dx.doi.org/10.1155/2014/148234},
  doi       = {10.1155/2014/148234},
  timestamp = {Tue, 20 Dec 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ijdsn/NandiDRS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/Sarkar14,
  author    = {Santanu Sarkar},
  title     = {Proving empirical key-correlations in {RC4}},
  journal   = {Inf. Process. Lett.},
  volume    = {114},
  number    = {5},
  pages     = {234--238},
  year      = {2014},
  url       = {http://dx.doi.org/10.1016/j.ipl.2014.01.002},
  doi       = {10.1016/j.ipl.2014.01.002},
  timestamp = {Mon, 10 Feb 2014 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ipl/Sarkar14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/GuptaMPS14,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar},
  title     = {(Non-)Random Sequences from (Non-)Random Permutations - Analysis of
               {RC4} Stream Cipher},
  journal   = {J. Cryptology},
  volume    = {27},
  number    = {1},
  pages     = {67--108},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/s00145-012-9138-1},
  doi       = {10.1007/s00145-012-9138-1},
  timestamp = {Fri, 14 Feb 2014 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/GuptaMPS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/GuptaMMPS14,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Willi Meier and
               Goutam Paul and
               Santanu Sarkar},
  title     = {Dependence in IV-Related Bytes of {RC4} Key Enhances Vulnerabilities
               in {WPA}},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  pages     = {350--369},
  year      = {2014},
  crossref  = {DBLP:conf/fse/2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-46706-0_18},
  doi       = {10.1007/978-3-662-46706-0_18},
  timestamp = {Wed, 22 Apr 2015 15:40:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/GuptaMMPS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SarkarV14,
  author    = {Santanu Sarkar and
               Ayineedi Venkateswarlu},
  title     = {Partial Key Exposure Attack on {CRT-RSA}},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  pages     = {255--264},
  year      = {2014},
  crossref  = {DBLP:conf/indocrypt/2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-13039-2_15},
  doi       = {10.1007/978-3-319-13039-2_15},
  timestamp = {Mon, 03 Nov 2014 13:28:59 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/SarkarV14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/SarkarM13,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Cryptanalytic results on 'Dual CRT' and 'Common Prime' {RSA}},
  journal   = {Des. Codes Cryptography},
  volume    = {66},
  number    = {1-3},
  pages     = {157--174},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/s10623-012-9675-5},
  doi       = {10.1007/s10623-012-9675-5},
  timestamp = {Mon, 07 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dcc/SarkarM13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BanikMST13,
  author    = {Subhadeep Banik and
               Subhamoy Maitra and
               Santanu Sarkar and
               Meltem S{\"{o}}nmez Turan},
  title     = {A Chosen {IV} Related Key Attack on Grain-128a},
  booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  pages     = {13--26},
  year      = {2013},
  crossref  = {DBLP:conf/acisp/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-39059-3_2},
  doi       = {10.1007/978-3-642-39059-3_2},
  timestamp = {Mon, 17 Jun 2013 13:10:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/BanikMST13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MaitraPSLM13,
  author    = {Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar and
               Michael Lehmann and
               Willi Meier},
  title     = {New Results on Generalization of Roos-Type Biases and Related Keystreams
               of {RC4}},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  pages     = {222--239},
  year      = {2013},
  crossref  = {DBLP:conf/africacrypt/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-38553-7_13},
  doi       = {10.1007/978-3-642-38553-7_13},
  timestamp = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/MaitraPSLM13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SarkarGM13,
  author    = {Santanu Sarkar and
               Sourav Sen Gupta and
               Subhamoy Maitra},
  title     = {Error Correction of Partially Exposed {RSA} Private Keys from {MSB}
               Side},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  pages     = {345--359},
  year      = {2013},
  crossref  = {DBLP:conf/iciss/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-45204-8_26},
  doi       = {10.1007/978-3-642-45204-8_26},
  timestamp = {Fri, 27 Dec 2013 17:57:35 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iciss/SarkarGM13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BanikSK13,
  author    = {Subhadeep Banik and
               Santanu Sarkar and
               Raghu Kacker},
  title     = {Security Analysis of the {RC4+} Stream Cipher},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
               on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  pages     = {297--307},
  year      = {2013},
  crossref  = {DBLP:conf/indocrypt/2013},
  url       = {http://dx.doi.org/10.1007/978-3-319-03515-4_20},
  doi       = {10.1007/978-3-319-03515-4_20},
  timestamp = {Thu, 12 Dec 2013 21:06:43 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/BanikSK13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-4795,
  author    = {Mrinal Nandi and
               Anup Dewanji and
               Bimal K. Roy and
               Santanu Sarkar},
  title     = {Model Selection Approach for Distributed Fault Detection in Wireless
               Sensor Networks},
  journal   = {CoRR},
  volume    = {abs/1301.4795},
  year      = {2013},
  url       = {http://arxiv.org/abs/1301.4795},
  timestamp = {Fri, 01 Feb 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1301-4795},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SarkarBM13,
  author    = {Santanu Sarkar and
               Subhadeep Banik and
               Subhamoy Maitra},
  title     = {Differential Fault Attack against Grain family with very few faults
               and minimal assumptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {494},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/494},
  timestamp = {Wed, 28 Aug 2013 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SarkarBM13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SarkarGPM13,
  author    = {Santanu Sarkar and
               Sourav Sen Gupta and
               Goutam Paul and
               Subhamoy Maitra},
  title     = {Proving TLS-attack related open biases of {RC4}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {502},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/502},
  timestamp = {Wed, 28 Aug 2013 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SarkarGPM13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/BanikMS12,
  author    = {Subhadeep Banik and
               Subhamoy Maitra and
               Santanu Sarkar},
  title     = {A Differential Fault Attack on the Grain Family of Stream Ciphers},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
               Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  pages     = {122--139},
  year      = {2012},
  crossref  = {DBLP:conf/ches/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-33027-8_8},
  doi       = {10.1007/978-3-642-33027-8_8},
  timestamp = {Fri, 07 Sep 2012 12:33:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/BanikMS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/SarkarM12,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Side Channel Attack to Actual Cryptanalysis: Breaking {CRT-RSA} with
               Low Weight Decryption Exponents},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
               Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  pages     = {476--493},
  year      = {2012},
  crossref  = {DBLP:conf/ches/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-33027-8_28},
  doi       = {10.1007/978-3-642-33027-8_28},
  timestamp = {Fri, 07 Sep 2012 12:33:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/SarkarM12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BanikMS12,
  author    = {Subhadeep Banik and
               Subhamoy Maitra and
               Santanu Sarkar},
  title     = {A Differential Fault Attack on the Grain Family under Reasonable Assumptions},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
               on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  pages     = {191--208},
  year      = {2012},
  crossref  = {DBLP:conf/indocrypt/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34931-7_12},
  doi       = {10.1007/978-3-642-34931-7_12},
  timestamp = {Mon, 18 Feb 2013 12:36:21 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/BanikMS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/space/PandeySJ12,
  author    = {Sumit Kumar Pandey and
               Santanu Sarkar and
               Mahabir Prasad Jhanwar},
  title     = {Relaxing {IND-CCA:} Indistinguishability against Chosen Ciphertext
               Verification Attack},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - Second International
               Conference, {SPACE} 2012, Chennai, India, November 3-4, 2012. Proceedings},
  pages     = {63--76},
  year      = {2012},
  crossref  = {DBLP:conf/space/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34416-9_5},
  doi       = {10.1007/978-3-642-34416-9_5},
  timestamp = {Sun, 21 Oct 2012 18:59:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/space/PandeySJ12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/space/BanikMS12,
  author    = {Subhadeep Banik and
               Subhamoy Maitra and
               Santanu Sarkar},
  title     = {Some Results on Related Key-IV Pairs of Grain},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - Second International
               Conference, {SPACE} 2012, Chennai, India, November 3-4, 2012. Proceedings},
  pages     = {94--110},
  year      = {2012},
  crossref  = {DBLP:conf/space/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34416-9_7},
  doi       = {10.1007/978-3-642-34416-9_7},
  timestamp = {Sun, 21 Oct 2012 18:59:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/space/BanikMS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/space/BanikMS12a,
  author    = {Subhadeep Banik and
               Subhamoy Maitra and
               Santanu Sarkar},
  title     = {A Differential Fault Attack on Grain-128a Using MACs},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - Second International
               Conference, {SPACE} 2012, Chennai, India, November 3-4, 2012. Proceedings},
  pages     = {111--125},
  year      = {2012},
  crossref  = {DBLP:conf/space/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34416-9_8},
  doi       = {10.1007/978-3-642-34416-9_8},
  timestamp = {Sun, 21 Oct 2012 18:59:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/space/BanikMS12a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/space/Sarkar12,
  author    = {Santanu Sarkar},
  title     = {Reduction in Lossiness of {RSA} Trapdoor Permutation},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - Second International
               Conference, {SPACE} 2012, Chennai, India, November 3-4, 2012. Proceedings},
  pages     = {144--152},
  year      = {2012},
  crossref  = {DBLP:conf/space/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34416-9_10},
  doi       = {10.1007/978-3-642-34416-9_10},
  timestamp = {Sun, 21 Oct 2012 18:59:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/space/Sarkar12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-0541,
  author    = {Mrinal Nandi and
               Amiya Nayak and
               Bimal K. Roy and
               Santanu Sarkar},
  title     = {Hypothesis Testing and Decision Theoretic Approach for Fault Detection
               in Wireless Sensor Networks},
  journal   = {CoRR},
  volume    = {abs/1203.0541},
  year      = {2012},
  url       = {http://arxiv.org/abs/1203.0541},
  timestamp = {Wed, 10 Oct 2012 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1203-0541},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM12,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {More on Correcting Errors in {RSA} Private Keys: Breaking {CRT-RSA}
               with Low Weight Decryption Exponents},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {106},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/106},
  timestamp = {Tue, 08 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SarkarM12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BanikMS12,
  author    = {Subhadeep Banik and
               Subhamoy Maitra and
               Santanu Sarkar},
  title     = {A Differential Fault Attack on Grain-128a using MACs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {349},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/349},
  timestamp = {Tue, 08 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BanikMS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/SarkarM11,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Approximate Integer Common Divisor Problem Relates to Implicit Factorization},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {57},
  number    = {6},
  pages     = {4002--4013},
  year      = {2011},
  url       = {http://dx.doi.org/10.1109/TIT.2011.2137270},
  doi       = {10.1109/TIT.2011.2137270},
  timestamp = {Wed, 09 Mar 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tit/SarkarM11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasMPS11,
  author    = {Apurba Das and
               Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar},
  title     = {Some Combinatorial Results towards State Recovery Attack on {RC4}},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  pages     = {204--214},
  year      = {2011},
  crossref  = {DBLP:conf/iciss/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25560-1_14},
  doi       = {10.1007/978-3-642-25560-1_14},
  timestamp = {Tue, 15 Nov 2011 15:49:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iciss/DasMPS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Sarkar11,
  author    = {Santanu Sarkar},
  title     = {Partial Key Exposure: Generalized Framework to Attack {RSA}},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
               on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  pages     = {76--92},
  year      = {2011},
  crossref  = {DBLP:conf/indocrypt/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25578-6_7},
  doi       = {10.1007/978-3-642-25578-6_7},
  timestamp = {Tue, 06 Dec 2011 15:52:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/Sarkar11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BanikMS11,
  author    = {Subhadeep Banik and
               Subhamoy Maitra and
               Santanu Sarkar},
  title     = {On the Evolution of {GGHN} Cipher},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
               on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  pages     = {181--195},
  year      = {2011},
  crossref  = {DBLP:conf/indocrypt/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25578-6_15},
  doi       = {10.1007/978-3-642-25578-6_15},
  timestamp = {Tue, 06 Dec 2011 15:52:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/BanikMS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GuptaMPS11,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar},
  title     = {Proof of Empirical {RC4} Biases and New Key Correlations},
  booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  pages     = {151--168},
  year      = {2011},
  crossref  = {DBLP:conf/sacrypt/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-28496-0_9},
  doi       = {10.1007/978-3-642-28496-0_9},
  timestamp = {Thu, 23 Feb 2012 18:09:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/GuptaMPS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SenguptaMPS11,
  author    = {Sourav Sengupta and
               Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar},
  title     = {{RC4:} (Non-)Random Words from (Non-)Random Permutations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {448},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/448},
  timestamp = {Fri, 13 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SenguptaMPS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/amco/SarkarM10,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Some applications of lattice based root finding techniques},
  journal   = {Adv. in Math. of Comm.},
  volume    = {4},
  number    = {4},
  pages     = {519--531},
  year      = {2010},
  url       = {http://dx.doi.org/10.3934/amc.2010.4.519},
  doi       = {10.3934/amc.2010.4.519},
  timestamp = {Tue, 29 Oct 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/amco/SarkarM10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/SarkarM10,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Cryptanalysis of {RSA} with two decryption exponents},
  journal   = {Inf. Process. Lett.},
  volume    = {110},
  number    = {5},
  pages     = {178--181},
  year      = {2010},
  url       = {http://dx.doi.org/10.1016/j.ipl.2009.11.016},
  doi       = {10.1016/j.ipl.2009.11.016},
  timestamp = {Fri, 30 Apr 2010 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ipl/SarkarM10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/SarkarM10a,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Cryptanalysis of {RSA} with more than one decryption exponent},
  journal   = {Inf. Process. Lett.},
  volume    = {110},
  number    = {8-9},
  pages     = {336--340},
  year      = {2010},
  url       = {http://dx.doi.org/10.1016/j.ipl.2010.02.016},
  doi       = {10.1016/j.ipl.2010.02.016},
  timestamp = {Fri, 30 Apr 2010 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ipl/SarkarM10a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MaitraSG10,
  author    = {Subhamoy Maitra and
               Santanu Sarkar and
               Sourav Sengupta},
  title     = {Factoring {RSA} Modulus Using Prime Reconstruction from Random Known
               Bits},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  pages     = {82--99},
  year      = {2010},
  crossref  = {DBLP:conf/africacrypt/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-12678-9_6},
  doi       = {10.1007/978-3-642-12678-9_6},
  timestamp = {Fri, 16 Jul 2010 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/MaitraSG10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MaitraS10,
  author    = {Subhamoy Maitra and
               Santanu Sarkar},
  title     = {Efficient {CRT-RSA} Decryption for Small Encryption Exponents},
  booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
               the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
               Proceedings},
  pages     = {26--40},
  year      = {2010},
  crossref  = {DBLP:conf/ctrsa/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-11925-5_3},
  doi       = {10.1007/978-3-642-11925-5_3},
  timestamp = {Thu, 18 Feb 2010 21:44:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/MaitraS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SarkarSM10,
  author    = {Santanu Sarkar and
               Sourav Sengupta and
               Subhamoy Maitra},
  title     = {Partial Key Exposure Attack on {RSA} - Improvements for Limited Lattice
               Dimensions},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
               on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  pages     = {2--16},
  year      = {2010},
  crossref  = {DBLP:conf/indocrypt/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-17401-8_2},
  doi       = {10.1007/978-3-642-17401-8_2},
  timestamp = {Wed, 08 Dec 2010 10:49:37 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/SarkarSM10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MaitraSS10,
  author    = {Subhamoy Maitra and
               Santanu Sarkar and
               Sourav Sengupta},
  title     = {Publishing Upper Half of {RSA} Decryption Exponent},
  booktitle = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  pages     = {25--39},
  year      = {2010},
  crossref  = {DBLP:conf/iwsec/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-16825-3_3},
  doi       = {10.1007/978-3-642-16825-3_3},
  timestamp = {Wed, 10 Nov 2010 11:10:23 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/MaitraSS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM10,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Some Applications of Lattice Based Root Finding Techniques},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {146},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/146},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SarkarM10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM10a,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Cryptanalysis of Dual {CRT-RSA}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {603},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/603},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SarkarM10a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/amco/SarkarM09,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Further results on implicit factoring in polynomial time},
  journal   = {Adv. in Math. of Comm.},
  volume    = {3},
  number    = {2},
  pages     = {205--217},
  year      = {2009},
  url       = {http://dx.doi.org/10.3934/amc.2009.3.205},
  doi       = {10.3934/amc.2009.3.205},
  timestamp = {Wed, 30 Oct 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/amco/SarkarM09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/SarkarM09,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Partial Key Exposure Attack on {CRT-RSA}},
  booktitle = {Applied Cryptography and Network Security, 7th International Conference,
               {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  pages     = {473--484},
  year      = {2009},
  crossref  = {DBLP:conf/acns/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-01957-9_29},
  doi       = {10.1007/978-3-642-01957-9_29},
  timestamp = {Wed, 20 May 2009 10:44:54 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/SarkarM09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MaitraS09,
  author    = {Subhamoy Maitra and
               Santanu Sarkar},
  title     = {On Deterministic Polynomial-Time Equivalence of Computing the {CRT-RSA}
               Secret Keys and Factoring},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {62},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/062},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/MaitraS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM09,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Further Results on Implicit Factoring in Polynomial Time},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {108},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/108},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SarkarM09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM09a,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Approximate Integer Common Divisor Problem relates to Implicit Factorization},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {626},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/626},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SarkarM09a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SarkarM08,
  author    = {Santanu Sarkar and
               Subhamoy Maitra},
  title     = {Improved Partial Key Exposure Attacks on {RSA} by Guessing a Few Bits
               of One of the Prime Factors},
  booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International
               Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  pages     = {37--51},
  year      = {2008},
  crossref  = {DBLP:conf/icisc/2008},
  url       = {http://dx.doi.org/10.1007/978-3-642-00730-9_3},
  doi       = {10.1007/978-3-642-00730-9_3},
  timestamp = {Fri, 20 Mar 2009 10:20:36 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/SarkarM08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MaitraS08,
  author    = {Subhamoy Maitra and
               Santanu Sarkar},
  title     = {A New Class of Weak Encryption Exponents in {RSA}},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
               on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  pages     = {337--349},
  year      = {2008},
  crossref  = {DBLP:conf/indocrypt/2008},
  url       = {http://dx.doi.org/10.1007/978-3-540-89754-5_26},
  doi       = {10.1007/978-3-540-89754-5_26},
  timestamp = {Thu, 27 Nov 2008 14:13:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/MaitraS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isw/MaitraS08,
  author    = {Subhamoy Maitra and
               Santanu Sarkar},
  title     = {Revisiting Wiener's Attack - New Weak Keys in {RSA}},
  booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
               Taiwan, September 15-18, 2008. Proceedings},
  pages     = {228--243},
  year      = {2008},
  crossref  = {DBLP:conf/isw/2008},
  url       = {http://dx.doi.org/10.1007/978-3-540-85886-7_16},
  doi       = {10.1007/978-3-540-85886-7_16},
  timestamp = {Mon, 22 Sep 2008 15:14:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isw/MaitraS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MaitraS08,
  author    = {Subhamoy Maitra and
               Santanu Sarkar},
  title     = {Revisiting Wiener's Attack - New Weak Keys in {RSA}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {228},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/228},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/MaitraS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SarkarMS08,
  author    = {Santanu Sarkar and
               Subhamoy Maitra and
               Sumanta Sarkar},
  title     = {{RSA} Cryptanalysis with Increased Bounds on the Secret Exponent using
               Less Lattice Dimension},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {315},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/315},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SarkarMS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isw/2016,
  editor    = {Matt Bishop and
               Anderson C. A. Nascimento},
  title     = {Information Security - 19th International Conference, {ISC} 2016,
               Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9866},
  publisher = {Springer},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-319-45871-7},
  doi       = {10.1007/978-3-319-45871-7},
  isbn      = {978-3-319-45870-0},
  timestamp = {Mon, 29 Aug 2016 09:21:11 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isw/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sscc/2016,
  editor    = {Peter M{\"{u}}ller and
               Sabu M. Thampi and
               Md. Zakirul Alam Bhuiyan and
               Ryan Kok Leong Ko and
               Robin Doss and
               Jose M. Alcaraz Calero},
  title     = {Security in Computing and Communications - 4th International Symposium,
               {SSCC} 2016, Jaipur, India, September 21-24, 2016, Proceedings},
  series    = {Communications in Computer and Information Science},
  volume    = {625},
  publisher = {Springer},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-981-10-2738-3},
  doi       = {10.1007/978-981-10-2738-3},
  isbn      = {978-981-10-2737-6},
  timestamp = {Tue, 20 Sep 2016 10:07:13 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sscc/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iciss/2015,
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-26961-0},
  doi       = {10.1007/978-3-319-26961-0},
  isbn      = {978-3-319-26960-3},
  timestamp = {Thu, 17 Dec 2015 15:53:05 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iciss/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2015,
  editor    = {Alex Biryukov and
               Vipul Goyal},
  title     = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
               on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9462},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-26617-6},
  doi       = {10.1007/978-3-319-26617-6},
  isbn      = {978-3-319-26616-9},
  timestamp = {Mon, 30 Nov 2015 15:50:36 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2014,
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-662-46706-0},
  doi       = {10.1007/978-3-662-46706-0},
  isbn      = {978-3-662-46705-3},
  timestamp = {Wed, 22 Apr 2015 15:40:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2014,
  editor    = {Willi Meier and
               Debdeep Mukhopadhyay},
  title     = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8885},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-13039-2},
  doi       = {10.1007/978-3-319-13039-2},
  isbn      = {978-3-319-13038-5},
  timestamp = {Mon, 03 Nov 2014 13:28:59 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2013,
  editor    = {Colin Boyd and
               Leonie Simpson},
  title     = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7959},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-39059-3},
  doi       = {10.1007/978-3-642-39059-3},
  isbn      = {978-3-642-39058-6},
  timestamp = {Mon, 17 Jun 2013 13:10:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2013,
  editor    = {Amr Youssef and
               Abderrahmane Nitaj and
               Aboul Ella Hassanien},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7918},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-38553-7},
  doi       = {10.1007/978-3-642-38553-7},
  isbn      = {978-3-642-38552-0},
  timestamp = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iciss/2013,
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-45204-8},
  doi       = {10.1007/978-3-642-45204-8},
  isbn      = {978-3-642-45203-1},
  timestamp = {Fri, 27 Dec 2013 17:57:35 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iciss/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2013,
  editor    = {Goutam Paul and
               Serge Vaudenay},
  title     = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
               on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8250},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-319-03515-4},
  doi       = {10.1007/978-3-319-03515-4},
  isbn      = {978-3-319-03514-7},
  timestamp = {Thu, 12 Dec 2013 21:06:43 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2012,
  editor    = {Emmanuel Prouff and
               Patrick Schaumont},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
               Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7428},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-33027-8},
  doi       = {10.1007/978-3-642-33027-8},
  isbn      = {978-3-642-33026-1},
  timestamp = {Fri, 07 Sep 2012 12:33:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2012,
  editor    = {Steven D. Galbraith and
               Mridul Nandi},
  title     = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
               on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7668},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34931-7},
  doi       = {10.1007/978-3-642-34931-7},
  isbn      = {978-3-642-34930-0},
  timestamp = {Mon, 18 Feb 2013 12:36:21 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/space/2012,
  editor    = {Andrey Bogdanov and
               Somitra Kumar Sanadhya},
  title     = {Security, Privacy, and Applied Cryptography Engineering - Second International
               Conference, {SPACE} 2012, Chennai, India, November 3-4, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7644},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34416-9},
  doi       = {10.1007/978-3-642-34416-9},
  isbn      = {978-3-642-34415-2},
  timestamp = {Sun, 21 Oct 2012 18:59:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/space/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iciss/2011,
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25560-1},
  doi       = {10.1007/978-3-642-25560-1},
  isbn      = {978-3-642-25559-5},
  timestamp = {Tue, 15 Nov 2011 15:49:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iciss/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2011,
  editor    = {Daniel J. Bernstein and
               Sanjit Chatterjee},
  title     = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
               on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7107},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25578-6},
  doi       = {10.1007/978-3-642-25578-6},
  isbn      = {978-3-642-25577-9},
  timestamp = {Tue, 06 Dec 2011 15:52:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2011,
  editor    = {Ali Miri and
               Serge Vaudenay},
  title     = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7118},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-28496-0},
  doi       = {10.1007/978-3-642-28496-0},
  isbn      = {978-3-642-28495-3},
  timestamp = {Thu, 23 Feb 2012 18:09:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2010,
  editor    = {Daniel J. Bernstein and
               Tanja Lange},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6055},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-12678-9},
  doi       = {10.1007/978-3-642-12678-9},
  isbn      = {978-3-642-12677-2},
  timestamp = {Fri, 30 Apr 2010 09:49:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2010,
  editor    = {Josef Pieprzyk},
  title     = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
               the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5985},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-11925-5},
  doi       = {10.1007/978-3-642-11925-5},
  isbn      = {978-3-642-11924-8},
  timestamp = {Thu, 18 Feb 2010 21:44:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2010,
  editor    = {Guang Gong and
               Kishan Chand Gupta},
  title     = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
               on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6498},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-17401-8},
  doi       = {10.1007/978-3-642-17401-8},
  isbn      = {978-3-642-17400-1},
  timestamp = {Wed, 08 Dec 2010 10:49:37 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010,
  editor    = {Isao Echizen and
               Noboru Kunihiro and
               Ry{\^{o}}ichi Sasaki},
  title     = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6434},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-16825-3},
  doi       = {10.1007/978-3-642-16825-3},
  isbn      = {978-3-642-16824-6},
  timestamp = {Wed, 10 Nov 2010 11:10:23 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2009,
  editor    = {Michel Abdalla and
               David Pointcheval and
               Pierre{-}Alain Fouque and
               Damien Vergnaud},
  title     = {Applied Cryptography and Network Security, 7th International Conference,
               {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5536},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-01957-9},
  doi       = {10.1007/978-3-642-01957-9},
  isbn      = {978-3-642-01956-2},
  timestamp = {Wed, 20 May 2009 10:44:54 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2008,
  editor    = {Pil Joong Lee and
               Jung Hee Cheon},
  title     = {Information Security and Cryptology - {ICISC} 2008, 11th International
               Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5461},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-00730-9},
  doi       = {10.1007/978-3-642-00730-9},
  isbn      = {978-3-642-00729-3},
  timestamp = {Fri, 20 Mar 2009 10:20:36 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2008,
  editor    = {Dipanwita Roy Chowdhury and
               Vincent Rijmen and
               Abhijit Das},
  title     = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
               on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5365},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-3-540-89753-8},
  timestamp = {Thu, 27 Nov 2008 14:13:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isw/2008,
  editor    = {Tzong{-}Chen Wu and
               Chin{-}Laung Lei and
               Vincent Rijmen and
               Der{-}Tsai Lee},
  title     = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
               Taiwan, September 15-18, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5222},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-3-540-85884-3},
  timestamp = {Mon, 22 Sep 2008 15:14:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isw/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier