BibTeX records: Adi Shamir

download as .bib file

@article{DBLP:journals/algorithmica/DodisSSW17,
  author    = {Yevgeniy Dodis and
               Adi Shamir and
               Noah Stephens{-}Davidowitz and
               Daniel Wichs},
  title     = {How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies
               for Compromised RNGs},
  journal   = {Algorithmica},
  volume    = {79},
  number    = {4},
  pages     = {1196--1232},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00453-016-0239-3},
  doi       = {10.1007/s00453-016-0239-3},
  timestamp = {Mon, 09 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/algorithmica/DodisSSW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/GenkinST17,
  author    = {Daniel Genkin and
               Adi Shamir and
               Eran Tromer},
  title     = {Acoustic Cryptanalysis},
  journal   = {J. Cryptology},
  volume    = {30},
  number    = {2},
  pages     = {392--443},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00145-015-9224-2},
  doi       = {10.1007/s00145-015-9224-2},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/GenkinST17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/RonenSWO17,
  author    = {Eyal Ronen and
               Adi Shamir and
               Achi{-}Or Weingarten and
               Colin O'Flynn},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {195--212},
  year      = {2017},
  crossref  = {DBLP:conf/sp/2017},
  url       = {https://doi.org/10.1109/SP.2017.14},
  doi       = {10.1109/SP.2017.14},
  timestamp = {Tue, 27 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sp/RonenSWO17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/NassiSE17,
  author    = {Ben Nassi and
               Adi Shamir and
               Yuval Elovici},
  title     = {Oops!...I think {I} scanned a malware},
  journal   = {CoRR},
  volume    = {abs/1703.07751},
  year      = {2017},
  url       = {http://arxiv.org/abs/1703.07751},
  archivePrefix = {arXiv},
  eprint    = {1703.07751},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/NassiSE17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/Bar-OnDDHKRS17,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Optimal Backup Strategies Against Cyber Attacks},
  journal   = {CoRR},
  volume    = {abs/1704.02659},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.02659},
  archivePrefix = {arXiv},
  eprint    = {1704.02659},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/Bar-OnDDHKRS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/GenkinPST16,
  author    = {Daniel Genkin and
               Lev Pachmanov and
               Itamar Pipman and
               Adi Shamir and
               Eran Tromer},
  title     = {Physical key extraction attacks on PCs},
  journal   = {Commun. {ACM}},
  volume    = {59},
  number    = {6},
  pages     = {70--79},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2851486},
  doi       = {10.1145/2851486},
  timestamp = {Mon, 30 May 2016 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cacm/GenkinPST16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/0001BDFHKSZ16,
  author    = {Elena Andreeva and
               Charles Bouillaguet and
               Orr Dunkelman and
               Pierre{-}Alain Fouque and
               Jonathan J. Hoch and
               John Kelsey and
               Adi Shamir and
               S{\'{e}}bastien Zimmer},
  title     = {New Second-Preimage Attacks on Hash Functions},
  journal   = {J. Cryptology},
  volume    = {29},
  number    = {4},
  pages     = {657--696},
  year      = {2016},
  url       = {https://doi.org/10.1007/s00145-015-9206-4},
  doi       = {10.1007/s00145-015-9206-4},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/0001BDFHKSZ16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/DinurDKS16,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes},
  journal   = {J. Cryptology},
  volume    = {29},
  number    = {4},
  pages     = {697--728},
  year      = {2016},
  url       = {https://doi.org/10.1007/s00145-015-9207-3},
  doi       = {10.1007/s00145-015-9207-3},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/DinurDKS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BihamCS16,
  author    = {Eli Biham and
               Yaniv Carmeli and
               Adi Shamir},
  title     = {Bug Attacks},
  journal   = {J. Cryptology},
  volume    = {29},
  number    = {4},
  pages     = {775--805},
  year      = {2016},
  url       = {https://doi.org/10.1007/s00145-015-9209-1},
  doi       = {10.1007/s00145-015-9209-1},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/BihamCS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurDKS16,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Memory-Efficient Algorithms for Finding Needles in Haystacks},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  pages     = {185--206},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-53008-5_7},
  doi       = {10.1007/978-3-662-53008-5_7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DinurDKS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/RonenS16,
  author    = {Eyal Ronen and
               Adi Shamir},
  title     = {Extended Functionality Attacks on IoT Devices: The Case of Smart Lights},
  booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages     = {3--12},
  year      = {2016},
  crossref  = {DBLP:conf/eurosp/2016},
  url       = {https://doi.org/10.1109/EuroSP.2016.13},
  doi       = {10.1109/EuroSP.2016.13},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurosp/RonenS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS16,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Memory-Efficient Algorithms for Finding Needles in Haystacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {560},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/560},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDKS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/RonenOSW16,
  author    = {Eyal Ronen and
               Colin O'Flynn and
               Adi Shamir and
               Achi{-}Or Weingarten},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1047},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1047},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/RonenOSW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/DunkelmanKS15,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Almost universal forgery attacks on AES-based MAC's},
  journal   = {Des. Codes Cryptography},
  volume    = {76},
  number    = {3},
  pages     = {431--449},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-014-9969-x},
  doi       = {10.1007/s10623-014-9969-x},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/dcc/DunkelmanKS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/DinurDKS15,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Reflections on slide with a twist attacks},
  journal   = {Des. Codes Cryptography},
  volume    = {77},
  number    = {2-3},
  pages     = {633--651},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-015-0098-y},
  doi       = {10.1007/s10623-015-0098-y},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/dcc/DinurDKS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/DunkelmanKS15,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Slidex Attacks on the Even-Mansour Encryption Scheme},
  journal   = {J. Cryptology},
  volume    = {28},
  number    = {1},
  pages     = {1--28},
  year      = {2015},
  url       = {https://doi.org/10.1007/s00145-013-9164-7},
  doi       = {10.1007/s00145-013-9164-7},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/DunkelmanKS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BihamDKS15,
  author    = {Eli Biham and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {New Attacks on {IDEA} with at Least 6 Rounds},
  journal   = {J. Cryptology},
  volume    = {28},
  number    = {2},
  pages     = {209--239},
  year      = {2015},
  url       = {https://doi.org/10.1007/s00145-013-9162-9},
  doi       = {10.1007/s00145-013-9162-9},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/BihamDKS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/DunkelmanKS15a,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Improved Single-Key Attacks on 8-Round {AES-192} and {AES-256}},
  journal   = {J. Cryptology},
  volume    = {28},
  number    = {3},
  pages     = {397--422},
  year      = {2015},
  url       = {https://doi.org/10.1007/s00145-013-9159-4},
  doi       = {10.1007/s00145-013-9159-4},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/DunkelmanKS15a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurDKS15,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {New Attacks on Feistel Structures with Improved Memory Complexities},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  pages     = {433--454},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47989-6_21},
  doi       = {10.1007/978-3-662-47989-6_21},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DinurDKS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/DinurDGS15,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Masha Gutman and
               Adi Shamir},
  title     = {Improved Top-Down Techniques in Differential Cryptanalysis},
  booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  pages     = {139--156},
  year      = {2015},
  crossref  = {DBLP:conf/latincrypt/2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8_8},
  doi       = {10.1007/978-3-319-22174-8_8},
  timestamp = {Wed, 24 May 2017 08:28:38 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/latincrypt/DinurDGS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS15,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {New Attacks on Feistel Structures with Improved Memory Complexities},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {146},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/146},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDKS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDGS15,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Masha Gutman and
               Adi Shamir},
  title     = {Improved Top-Down Techniques in Differential Cryptanalysis},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {268},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/268},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDGS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/DinurDKS14,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Dissection: a new paradigm for solving bicomposite search problems},
  journal   = {Commun. {ACM}},
  volume    = {57},
  number    = {10},
  pages     = {98--105},
  year      = {2014},
  url       = {http://doi.acm.org/10.1145/2661434},
  doi       = {10.1145/2661434},
  timestamp = {Wed, 08 Oct 2014 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cacm/DinurDKS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/DinurDS14,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Adi Shamir},
  title     = {Improved Practical Attacks on Round-Reduced Keccak},
  journal   = {J. Cryptology},
  volume    = {27},
  number    = {2},
  pages     = {183--209},
  year      = {2014},
  url       = {https://doi.org/10.1007/s00145-012-9142-5},
  doi       = {10.1007/s00145-012-9142-5},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/DinurDS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/DunkelmanKS14,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {A Practical-Time Related-Key Attack on the {KASUMI} Cryptosystem Used
               in {GSM} and 3G Telephony},
  journal   = {J. Cryptology},
  volume    = {27},
  number    = {4},
  pages     = {824--849},
  year      = {2014},
  url       = {https://doi.org/10.1007/s00145-013-9154-9},
  doi       = {10.1007/s00145-013-9154-9},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/DunkelmanKS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DinurDKS14,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  pages     = {439--457},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-45611-8_23},
  doi       = {10.1007/978-3-662-45611-8_23},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/DinurDKS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisSSW14,
  author    = {Yevgeniy Dodis and
               Adi Shamir and
               Noah Stephens{-}Davidowitz and
               Daniel Wichs},
  title     = {How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies
               for Compromised RNGs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  pages     = {37--54},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-2},
  url       = {https://doi.org/10.1007/978-3-662-44381-1_3},
  doi       = {10.1007/978-3-662-44381-1_3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DodisSSW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GenkinST14,
  author    = {Daniel Genkin and
               Adi Shamir and
               Eran Tromer},
  title     = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {444--461},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2_25},
  doi       = {10.1007/978-3-662-44371-2_25},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/GenkinST14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/RonS14,
  author    = {Dorit Ron and
               Adi Shamir},
  title     = {How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?},
  booktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
               and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
               Papers},
  pages     = {3--15},
  year      = {2014},
  crossref  = {DBLP:conf/fc/2014w},
  url       = {https://doi.org/10.1007/978-3-662-44774-1_1},
  doi       = {10.1007/978-3-662-44774-1_1},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/RonS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDKS14,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Improved Linear Sieving Techniques with Applications to Step-Reduced
               {LED-64}},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  pages     = {390--410},
  year      = {2014},
  crossref  = {DBLP:conf/fse/2014},
  url       = {https://doi.org/10.1007/978-3-662-46706-0_20},
  doi       = {10.1007/978-3-662-46706-0_20},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/DinurDKS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PolakS14,
  author    = {Inna Polak and
               Adi Shamir},
  title     = {Using Random Error Correcting Codes in Near-Collision Attacks on Generic
               Hash-Functions},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  pages     = {219--236},
  year      = {2014},
  crossref  = {DBLP:conf/indocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-319-13039-2_13},
  doi       = {10.1007/978-3-319-13039-2_13},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/indocrypt/PolakS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisSSW14,
  author    = {Yevgeniy Dodis and
               Adi Shamir and
               Noah Stephens{-}Davidowitz and
               Daniel Wichs},
  title     = {How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies
               for Compromised RNGs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {167},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/167},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisSSW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/PolakS14,
  author    = {Inna Polak and
               Adi Shamir},
  title     = {Using Random Error Correcting Codes in Near-Collision Attacks on Generic
               Hash-Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {417},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/417},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/PolakS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS14,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Reflections on Slide with a Twist Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {847},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/847},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDKS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DinurDKS13,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and
               Full {AES2}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  pages     = {337--356},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-42033-7_18},
  doi       = {10.1007/978-3-642-42033-7_18},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/DinurDKS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/RonS13,
  author    = {Dorit Ron and
               Adi Shamir},
  title     = {Quantitative Analysis of the Full Bitcoin Transaction Graph},
  booktitle = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  pages     = {6--24},
  year      = {2013},
  crossref  = {DBLP:conf/fc/2013},
  url       = {https://doi.org/10.1007/978-3-642-39884-1_2},
  doi       = {10.1007/978-3-642-39884-1_2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/RonS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDS13,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Adi Shamir},
  title     = {Collision Attacks on Up to 5 Rounds of {SHA-3} Using Generalized Internal
               Differentials},
  booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
               Singapore, March 11-13, 2013. Revised Selected Papers},
  pages     = {219--240},
  year      = {2013},
  crossref  = {DBLP:conf/fse/2013},
  url       = {https://doi.org/10.1007/978-3-662-43933-3_12},
  doi       = {10.1007/978-3-662-43933-3_12},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/DinurDS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS13,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and
               Full AES\({}^{\mbox{2}}\)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {391},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/391},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDKS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS13a,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Improved Linear Sieving Techniques with Applications to Step-Reduced
               {LED-64}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {634},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/634},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDKS13a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BihamCDDKS13,
  author    = {Eli Biham and
               Yaniv Carmeli and
               Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {674},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/674},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BihamCDDKS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/RonS13,
  author    = {Dorit Ron and
               Adi Shamir},
  title     = {How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {782},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/782},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/RonS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GenkinST13,
  author    = {Daniel Genkin and
               Adi Shamir and
               Eran Tromer},
  title     = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {857},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/857},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GenkinST13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ccds/DinurS12,
  author    = {Itai Dinur and
               Adi Shamir},
  title     = {Applying cube attacks to stream ciphers in realistic scenarios},
  journal   = {Cryptography and Communications},
  volume    = {4},
  number    = {3-4},
  pages     = {217--232},
  year      = {2012},
  url       = {https://doi.org/10.1007/s12095-012-0068-4},
  doi       = {10.1007/s12095-012-0068-4},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ccds/DinurS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acm/CerfHKRS12,
  author    = {Vint Cerf and
               John E. Hopcroft and
               Robert E. Kahn and
               Ronald L. Rivest and
               Adi Shamir},
  title     = {Information, Data, Security in a Networked Future},
  booktitle = {{ACM} Turing Centenary Celebration, {ACM-TURING} '12, San Francisco,
               California, USA, June 15-16, 2012},
  pages     = {14:1},
  year      = {2012},
  crossref  = {DBLP:conf/acm/2012t},
  url       = {http://doi.acm.org/10.1145/2322176.2322190},
  doi       = {10.1145/2322176.2322190},
  timestamp = {Tue, 19 Apr 2016 19:37:25 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acm/CerfHKRS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurDKS12,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis,
               Knapsacks, and Combinatorial Search Problems},
  booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  pages     = {719--740},
  year      = {2012},
  crossref  = {DBLP:conf/crypto/2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5_42},
  doi       = {10.1007/978-3-642-32009-5_42},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DinurDKS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKS12,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  pages     = {336--354},
  year      = {2012},
  crossref  = {DBLP:conf/eurocrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4_21},
  doi       = {10.1007/978-3-642-29011-4_21},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/DunkelmanKS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDS12,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Adi Shamir},
  title     = {Improved Attacks on Full {GOST}},
  booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
               Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  pages     = {9--28},
  year      = {2012},
  crossref  = {DBLP:conf/fse/2012},
  url       = {https://doi.org/10.1007/978-3-642-34047-5_2},
  doi       = {10.1007/978-3-642-34047-5_2},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/DinurDS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDS12a,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Adi Shamir},
  title     = {New Attacks on Keccak-224 and Keccak-256},
  booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
               Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  pages     = {442--461},
  year      = {2012},
  crossref  = {DBLP:conf/fse/2012},
  url       = {https://doi.org/10.1007/978-3-642-34047-5_25},
  doi       = {10.1007/978-3-642-34047-5_25},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/DinurDS12a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS12,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis,
               Knapsacks, and Combinatorial Search Problems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {217},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/217},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDKS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ShamirZ12,
  author    = {Adi Shamir and
               Eldad Zinger},
  title     = {A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem
               Proposed by John Nash},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {339},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/339},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ShamirZ12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/RonS12,
  author    = {Dorit Ron and
               Adi Shamir},
  title     = {Quantitative Analysis of the Full Bitcoin Transaction Graph},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {584},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/584},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/RonS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDS12,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Adi Shamir},
  title     = {Self-Differential Cryptanalysis of Up to 5 Rounds of {SHA-3}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {672},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/672},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/mst/DolevKS11,
  author    = {Shlomi Dolev and
               Marina Kopeetsky and
               Adi Shamir},
  title     = {{RFID} Authentication Efficient Proactive Information Security within
               Computational Security},
  journal   = {Theory Comput. Syst.},
  volume    = {48},
  number    = {1},
  pages     = {132--149},
  year      = {2011},
  url       = {https://doi.org/10.1007/s00224-009-9236-0},
  doi       = {10.1007/s00224-009-9236-0},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/mst/DolevKS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DinurGPSZ11,
  author    = {Itai Dinur and
               Tim G{\"{u}}neysu and
               Christof Paar and
               Adi Shamir and
               Ralf Zimmermann},
  title     = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated
               Reconfigurable Hardware},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  pages     = {327--343},
  year      = {2011},
  crossref  = {DBLP:conf/asiacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0_18},
  doi       = {10.1007/978-3-642-25385-0_18},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/DinurGPSZ11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurS11,
  author    = {Itai Dinur and
               Adi Shamir},
  title     = {An Improved Algebraic Attack on Hamsi-256},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  pages     = {88--106},
  year      = {2011},
  crossref  = {DBLP:conf/fse/2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9_6},
  doi       = {10.1007/978-3-642-21702-9_6},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/DinurS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurS11a,
  author    = {Itai Dinur and
               Adi Shamir},
  title     = {Breaking Grain-128 with Dynamic Cube Attacks},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  pages     = {167--187},
  year      = {2011},
  crossref  = {DBLP:conf/fse/2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9_10},
  doi       = {10.1007/978-3-642-21702-9_10},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/DinurS11a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/ShamirT11,
  author    = {Adi Shamir and
               Eran Tromer},
  title     = {{TWIRL}},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {1338--1339},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_483},
  doi       = {10.1007/978-1-4419-5906-5_483},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/ShamirT11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS11,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {{ALRED} Blues: New Attacks on AES-Based MAC's},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {95},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/095},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DunkelmanKS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurGPSZ11,
  author    = {Itai Dinur and
               Tim G{\"{u}}neysu and
               Christof Paar and
               Adi Shamir and
               Ralf Zimmermann},
  title     = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated
               Reconfigurable Hardware},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {282},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/282},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurGPSZ11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BihamDKS11,
  author    = {Eli Biham and
               Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {New Data-Efficient Attacks on Reduced-Round {IDEA}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {417},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/417},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BihamDKS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS11a,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {541},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/541},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DunkelmanKS11a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDS11,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Adi Shamir},
  title     = {Improved Attacks on Full {GOST}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {558},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/558},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurDS11a,
  author    = {Itai Dinur and
               Orr Dunkelman and
               Adi Shamir},
  title     = {New attacks on Keccak-224 and Keccak-256},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {624},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/624},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurDS11a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/TromerOS10,
  author    = {Eran Tromer and
               Dag Arne Osvik and
               Adi Shamir},
  title     = {Efficient Cache Attacks on AES, and Countermeasures},
  journal   = {J. Cryptology},
  volume    = {23},
  number    = {1},
  pages     = {37--71},
  year      = {2010},
  url       = {https://doi.org/10.1007/s00145-009-9049-y},
  doi       = {10.1007/s00145-009-9049-y},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/TromerOS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BiryukovS10,
  author    = {Alex Biryukov and
               Adi Shamir},
  title     = {Structural Cryptanalysis of {SASAS}},
  journal   = {J. Cryptology},
  volume    = {23},
  number    = {4},
  pages     = {505--518},
  year      = {2010},
  url       = {https://doi.org/10.1007/s00145-010-9062-1},
  doi       = {10.1007/s00145-010-9062-1},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/BiryukovS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/HommaMASS10,
  author    = {Naofumi Homma and
               Atsushi Miyamoto and
               Takafumi Aoki and
               Akashi Satoh and
               Adi Shamir},
  title     = {Comparative Power Analysis of Modular Exponentiation Algorithms},
  journal   = {{IEEE} Trans. Computers},
  volume    = {59},
  number    = {6},
  pages     = {795--807},
  year      = {2010},
  url       = {https://doi.org/10.1109/TC.2009.176},
  doi       = {10.1109/TC.2009.176},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tc/HommaMASS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DunkelmanKS10,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Improved Single-Key Attacks on 8-Round {AES-192} and {AES-256}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  pages     = {158--176},
  year      = {2010},
  crossref  = {DBLP:conf/asiacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8_10},
  doi       = {10.1007/978-3-642-17373-8_10},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/DunkelmanKS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/BouillaguetCCCNSY10,
  author    = {Charles Bouillaguet and
               Hsieh{-}Chung Chen and
               Chen{-}Mou Cheng and
               Tung Chou and
               Ruben Niederhagen and
               Adi Shamir and
               Bo{-}Yin Yang},
  title     = {Fast Exhaustive Search for Polynomial Systems in \emph{F}\({}_{\mbox{2}}\)},
  booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
               Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  pages     = {203--218},
  year      = {2010},
  crossref  = {DBLP:conf/ches/2010},
  url       = {https://doi.org/10.1007/978-3-642-15031-9_14},
  doi       = {10.1007/978-3-642-15031-9_14},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/BouillaguetCCCNSY10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DunkelmanKS10,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {A Practical-Time Related-Key Attack on the {KASUMI} Cryptosystem Used
               in {GSM} and 3G Telephony},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  pages     = {393--410},
  year      = {2010},
  crossref  = {DBLP:conf/crypto/2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7_21},
  doi       = {10.1007/978-3-642-14623-7_21},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DunkelmanKS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BiryukovDKKS10,
  author    = {Alex Biryukov and
               Orr Dunkelman and
               Nathan Keller and
               Dmitry Khovratovich and
               Adi Shamir},
  title     = {Key Recovery Attacks of Practical Complexity on {AES-256} Variants
               with up to 10 Rounds},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               French Riviera, May 30 - June 3, 2010. Proceedings},
  pages     = {299--319},
  year      = {2010},
  crossref  = {DBLP:conf/eurocrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5_15},
  doi       = {10.1007/978-3-642-13190-5_15},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/BiryukovDKKS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/DinurS10,
  author    = {Itai Dinur and
               Adi Shamir},
  title     = {Generic Analysis of Small Cryptographic Leaks},
  booktitle = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
               2010, Santa Barbara, California, USA, 21 August 2010},
  pages     = {39--48},
  year      = {2010},
  crossref  = {DBLP:conf/fdtc/2010},
  url       = {https://doi.org/10.1109/FDTC.2010.11},
  doi       = {10.1109/FDTC.2010.11},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fdtc/DinurS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS10,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {A Practical-Time Attack on the {A5/3} Cryptosystem Used in Third Generation
               {GSM} Telephony},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {13},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/013},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DunkelmanKS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetCCNSY10,
  author    = {Charles Bouillaguet and
               Chen{-}Mou Cheng and
               Tung Chou and
               Ruben Niederhagen and
               Adi Shamir and
               Bo{-}Yin Yang},
  title     = {Fast Exhaustive Search for Polynomial Systems in F\({}_{\mbox{2}}\)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {313},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/313},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BouillaguetCCNSY10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS10a,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Adi Shamir},
  title     = {Improved Single-Key Attacks on 8-round {AES}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {322},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/322},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DunkelmanKS10a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurS10,
  author    = {Itai Dinur and
               Adi Shamir},
  title     = {Breaking Grain-128 with Dynamic Cube Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {570},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/570},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurS10a,
  author    = {Itai Dinur and
               Adi Shamir},
  title     = {An Improved Algebraic Attack on Hamsi-256},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {602},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/602},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurS10a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DinurS09,
  author    = {Itai Dinur and
               Adi Shamir},
  title     = {Cube Attacks on Tweakable Black Box Polynomials},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  pages     = {278--299},
  year      = {2009},
  crossref  = {DBLP:conf/eurocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9_16},
  doi       = {10.1007/978-3-642-01001-9_16},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/DinurS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonDMS09,
  author    = {Jean{-}Philippe Aumasson and
               Itai Dinur and
               Willi Meier and
               Adi Shamir},
  title     = {Cube Testers and Key Recovery Attacks on Reduced-Round {MD6} and Trivium},
  booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  pages     = {1--22},
  year      = {2009},
  crossref  = {DBLP:conf/fse/2009},
  url       = {https://doi.org/10.1007/978-3-642-03317-9_1},
  doi       = {10.1007/978-3-642-03317-9_1},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/AumassonDMS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/AumassonDMS09,
  author    = {Jean{-}Philippe Aumasson and
               Itai Dinur and
               Willi Meier and
               Adi Shamir},
  title     = {Cube Testers and Key Recovery Attacks On Reduced-Round {MD6} and Trivium},
  booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009},
  year      = {2009},
  crossref  = {DBLP:conf/dagstuhl/2009P9031},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2009/1944/},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dagstuhl/AumassonDMS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-5177,
  author    = {Shlomi Dolev and
               Marina Kopeetsky and
               Adi Shamir},
  title     = {{RFID} Authentication, Efficient Proactive Information Security within
               Computational Security},
  journal   = {CoRR},
  volume    = {abs/0903.5177},
  year      = {2009},
  url       = {http://arxiv.org/abs/0903.5177},
  archivePrefix = {arXiv},
  eprint    = {0903.5177},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-0903-5177},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/FrumkinS09,
  author    = {Dmitry Frumkin and
               Adi Shamir},
  title     = {Un-Trusted-HB: Security Vulnerabilities of Trusted-HB},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {44},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/044},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/FrumkinS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurS09,
  author    = {Itai Dinur and
               Adi Shamir},
  title     = {Side Channel Cube Attacks on Block Ciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {127},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/127},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AumassonDHMS09,
  author    = {Jean{-}Philippe Aumasson and
               Itai Dinur and
               Luca Henzen and
               Willi Meier and
               Adi Shamir},
  title     = {Efficient {FPGA} Implementations of High-Dimensional Cube Testers
               on the Stream Cipher Grain-128},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {218},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/218},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AumassonDHMS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovDKKS09,
  author    = {Alex Biryukov and
               Orr Dunkelman and
               Nathan Keller and
               Dmitry Khovratovich and
               Adi Shamir},
  title     = {Key Recovery Attacks of Practical Complexity on {AES} Variants With
               Up To 10 Rounds},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {374},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/374},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BiryukovDKKS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cryptologia/PhanS08,
  author    = {Raphael Chung{-}Wei Phan and
               Adi Shamir},
  title     = {Improved Related-key Attacks on Desx and Desx+},
  journal   = {Cryptologia},
  volume    = {32},
  number    = {1},
  pages     = {13--22},
  year      = {2008},
  url       = {https://doi.org/10.1080/01611190701743690},
  doi       = {10.1080/01611190701743690},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cryptologia/PhanS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/HommaMASS08,
  author    = {Naofumi Homma and
               Atsushi Miyamoto and
               Takafumi Aoki and
               Akashi Satoh and
               Adi Shamir},
  title     = {Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message
               Pairs},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
               Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  pages     = {15--29},
  year      = {2008},
  crossref  = {DBLP:conf/ches/2008},
  url       = {https://doi.org/10.1007/978-3-540-85053-3_2},
  doi       = {10.1007/978-3-540-85053-3_2},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/HommaMASS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/Shamir08,
  author    = {Adi Shamir},
  title     = {RSA-Past, Present, Future},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
               Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  pages     = {443},
  year      = {2008},
  crossref  = {DBLP:conf/ches/2008},
  url       = {https://doi.org/10.1007/978-3-540-85053-3_28},
  doi       = {10.1007/978-3-540-85053-3_28},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/Shamir08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamCS08,
  author    = {Eli Biham and
               Yaniv Carmeli and
               Adi Shamir},
  title     = {Bug Attacks},
  booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  pages     = {221--240},
  year      = {2008},
  crossref  = {DBLP:conf/crypto/2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5_13},
  doi       = {10.1007/978-3-540-85174-5_13},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BihamCS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AndreevaBFHKSZ08,
  author    = {Elena Andreeva and
               Charles Bouillaguet and
               Pierre{-}Alain Fouque and
               Jonathan J. Hoch and
               John Kelsey and
               Adi Shamir and
               S{\'{e}}bastien Zimmer},
  title     = {Second Preimage Attacks on Dithered Hash Functions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Istanbul, Turkey, April 13-17, 2008. Proceedings},
  pages     = {270--288},
  year      = {2008},
  crossref  = {DBLP:conf/eurocrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-78967-3_16},
  doi       = {10.1007/978-3-540-78967-3_16},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/AndreevaBFHKSZ08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/Shamir08,
  author    = {Adi Shamir},
  title     = {{SQUASH} - {A} New {MAC} with Provable Security Properties for Highly
               Constrained Devices Such as {RFID} Tags},
  booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
               Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  pages     = {144--157},
  year      = {2008},
  crossref  = {DBLP:conf/fse/2008},
  url       = {https://doi.org/10.1007/978-3-540-71039-4_9},
  doi       = {10.1007/978-3-540-71039-4_9},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/Shamir08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HochS08,
  author    = {Jonathan J. Hoch and
               Adi Shamir},
  title     = {On the Strength of the Concatenated Hash Combiner When All the Hash
               Functions Are Weak},
  booktitle = {Automata, Languages and Programming, 35th International Colloquium,
               {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
               {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
               Track {C:} Security and Cryptography Foundations},
  pages     = {616--630},
  year      = {2008},
  crossref  = {DBLP:conf/icalp/2008-2},
  url       = {https://doi.org/10.1007/978-3-540-70583-3_50},
  doi       = {10.1007/978-3-540-70583-3_50},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/HochS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/HochS08,
  author    = {Jonathan J. Hoch and
               Adi Shamir},
  title     = {On the Strength of the Concatenated Hash Combiner when All the Hash
               Functions are Weak},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {75},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/075},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/HochS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DinurS08,
  author    = {Itai Dinur and
               Adi Shamir},
  title     = {Cube Attacks on Tweakable Black Box Polynomials},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {385},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/385},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DinurS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jmc/RuinskiyST07,
  author    = {Dima Ruinskiy and
               Adi Shamir and
               Boaz Tsaban},
  title     = {Length-based cryptanalysis: the case of Thompson's group},
  journal   = {J. Mathematical Cryptology},
  volume    = {1},
  number    = {4},
  pages     = {359--372},
  year      = {2007},
  url       = {https://doi.org/10.1515/jmc.2007.018},
  doi       = {10.1515/jmc.2007.018},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jmc/RuinskiyST07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/OrenS07,
  author    = {Yossef Oren and
               Adi Shamir},
  title     = {Remote Password Extraction from {RFID} Tags},
  journal   = {{IEEE} Trans. Computers},
  volume    = {56},
  number    = {9},
  pages     = {1292--1296},
  year      = {2007},
  url       = {https://doi.org/10.1109/TC.2007.1050},
  doi       = {10.1109/TC.2007.1050},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tc/OrenS07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cisc/DuboisFSS08,
  author    = {Vivien Dubois and
               Pierre{-}Alain Fouque and
               Adi Shamir and
               Jacques Stern},
  title     = {Cryptanalysis of the {SFLASH} Signature Scheme},
  booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
               2007, Xining, China, August 31 - September 5, 2007, Revised Selected
               Papers},
  pages     = {1--4},
  year      = {2007},
  crossref  = {DBLP:conf/cisc/2008},
  url       = {https://doi.org/10.1007/978-3-540-79499-8_1},
  doi       = {10.1007/978-3-540-79499-8_1},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cisc/DuboisFSS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DuboisFSS07,
  author    = {Vivien Dubois and
               Pierre{-}Alain Fouque and
               Adi Shamir and
               Jacques Stern},
  title     = {Practical Cryptanalysis of {SFLASH}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  pages     = {1--12},
  year      = {2007},
  crossref  = {DBLP:conf/crypto/2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5_1},
  doi       = {10.1007/978-3-540-74143-5_1},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DuboisFSS07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/RuinskiyST07,
  author    = {Dima Ruinskiy and
               Adi Shamir and
               Boaz Tsaban},
  title     = {Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup
               Distance Functions},
  booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference
               on Practice and Theory in Public-Key Cryptography, Beijing, China,
               April 16-20, 2007, Proceedings},
  pages     = {61--75},
  year      = {2007},
  crossref  = {DBLP:conf/pkc/2007},
  url       = {https://doi.org/10.1007/978-3-540-71677-8_5},
  doi       = {10.1007/978-3-540-71677-8_5},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/RuinskiyST07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-0705-2862,
  author    = {Dima Ruinskiy and
               Adi Shamir and
               Boaz Tsaban},
  title     = {Cryptanalysis of group-based key agreement protocols using subgroup
               distance functions},
  journal   = {CoRR},
  volume    = {abs/0705.2862},
  year      = {2007},
  url       = {http://arxiv.org/abs/0705.2862},
  archivePrefix = {arXiv},
  eprint    = {0705.2862},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-0705-2862},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DuboisFSS07,
  author    = {Vivien Dubois and
               Pierre{-}Alain Fouque and
               Adi Shamir and
               Jacques Stern},
  title     = {Practical Cryptanalysis of {SFLASH}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {141},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/141},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DuboisFSS07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFSZ07,
  author    = {Charles Bouillaguet and
               Pierre{-}Alain Fouque and
               Adi Shamir and
               S{\'{e}}bastien Zimmer},
  title     = {Second Preimage Attacks on Dithered Hash Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {395},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/395},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BouillaguetFSZ07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/birthday/RivestST06,
  author    = {Ronald L. Rivest and
               Adi Shamir and
               Yael Tauman},
  title     = {How to Leak a Secret: Theory and Applications of Ring Signatures},
  booktitle = {Theoretical Computer Science, Essays in Memory of Shimon Even},
  pages     = {164--186},
  year      = {2006},
  crossref  = {DBLP:conf/birthday/2006even},
  url       = {https://doi.org/10.1007/11685654_7},
  doi       = {10.1007/11685654_7},
  timestamp = {Wed, 15 Nov 2017 19:50:09 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/birthday/RivestST06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarkanBS06,
  author    = {Elad Barkan and
               Eli Biham and
               Adi Shamir},
  title     = {Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2006, Proceedings},
  pages     = {1--21},
  year      = {2006},
  crossref  = {DBLP:conf/crypto/2006},
  url       = {https://doi.org/10.1007/11818175_1},
  doi       = {10.1007/11818175_1},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BarkanBS06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/OsvikST06,
  author    = {Dag Arne Osvik and
               Adi Shamir and
               Eran Tromer},
  title     = {Cache Attacks and Countermeasures: The Case of {AES}},
  booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
               the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
               Proceedings},
  pages     = {1--20},
  year      = {2006},
  crossref  = {DBLP:conf/ctrsa/2006},
  url       = {https://doi.org/10.1007/11605805_1},
  doi       = {10.1007/11605805_1},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/OsvikST06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/HochS06,
  author    = {Jonathan J. Hoch and
               Adi Shamir},
  title     = {Breaking the {ICE} - Finding Multicollisions in Iterated Concatenated
               and Expanded {(ICE)} Hash Functions},
  booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
               Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  pages     = {179--194},
  year      = {2006},
  crossref  = {DBLP:conf/fse/2006},
  url       = {https://doi.org/10.1007/11799313_12},
  doi       = {10.1007/11799313_12},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/HochS06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0607079,
  author    = {Dima Ruinskiy and
               Adi Shamir and
               Boaz Tsaban},
  title     = {Length-based cryptanalysis: The case of Thompson's Group},
  journal   = {CoRR},
  volume    = {abs/cs/0607079},
  year      = {2006},
  url       = {http://arxiv.org/abs/cs/0607079},
  archivePrefix = {arXiv},
  eprint    = {cs/0607079},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/abs-cs-0607079},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/RuinskiyST06,
  author    = {Dima Ruinskiy and
               Adi Shamir and
               Boaz Tsaban},
  title     = {Length-based cryptanalysis: The case of Thompson's Group},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {244},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/244},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/RuinskiyST06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BihamBS05,
  author    = {Eli Biham and
               Alex Biryukov and
               Adi Shamir},
  title     = {Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials},
  journal   = {J. Cryptology},
  volume    = {18},
  number    = {4},
  pages     = {291--311},
  year      = {2005},
  url       = {https://doi.org/10.1007/s00145-005-0129-3},
  doi       = {10.1007/s00145-005-0129-3},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/BihamBS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/GeiselmannSST05,
  author    = {Willi Geiselmann and
               Adi Shamir and
               Rainer Steinwandt and
               Eran Tromer},
  title     = {Scalable Hardware for Sparse Systems of Linear Equations, with Applications
               to Integer Factorization},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
               Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  pages     = {131--146},
  year      = {2005},
  crossref  = {DBLP:conf/ches/2005},
  url       = {https://doi.org/10.1007/11545262_10},
  doi       = {10.1007/11545262_10},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/GeiselmannSST05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/KlimovS05,
  author    = {Alexander Klimov and
               Adi Shamir},
  title     = {New Applications of T-Functions in Block Ciphers and Hash Functions},
  booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
               Paris, France, February 21-23, 2005, Revised Selected Papers},
  pages     = {18--31},
  year      = {2005},
  crossref  = {DBLP:conf/fse/2005},
  url       = {https://doi.org/10.1007/11502760_2},
  doi       = {10.1007/11502760_2},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/KlimovS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovS05,
  author    = {Alex Biryukov and
               Adi Shamir},
  title     = {Analysis of the Non-linear Part of Mugi},
  booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
               Paris, France, February 21-23, 2005, Revised Selected Papers},
  pages     = {320--329},
  year      = {2005},
  crossref  = {DBLP:conf/fse/2005},
  url       = {https://doi.org/10.1007/11502760_21},
  doi       = {10.1007/11502760_21},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/BiryukovS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/ShamirT05,
  author    = {Adi Shamir and
               Eran Tromer},
  title     = {{TWIRL}},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_442},
  doi       = {10.1007/0-387-23483-7_442},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/ShamirT05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/OsvikST05,
  author    = {Dag Arne Osvik and
               Adi Shamir and
               Eran Tromer},
  title     = {Cache attacks and Countermeasures: the Case of {AES}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {271},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/271},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/OsvikST05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Shamir04,
  author    = {Adi Shamir},
  title     = {Stream Ciphers: Dead or Alive?},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Jeju Island, Korea, December 5-9, 2004, Proceedings},
  pages     = {78},
  year      = {2004},
  crossref  = {DBLP:conf/asiacrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-30539-2_6},
  doi       = {10.1007/978-3-540-30539-2_6},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/Shamir04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/HochS04,
  author    = {Jonathan J. Hoch and
               Adi Shamir},
  title     = {Fault Analysis of Stream Ciphers},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
               Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  pages     = {240--253},
  year      = {2004},
  crossref  = {DBLP:conf/ches/2004},
  url       = {https://doi.org/10.1007/978-3-540-28632-5_18},
  doi       = {10.1007/978-3-540-28632-5_18},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/HochS04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/KlimovS04,
  author    = {Alexander Klimov and
               Adi Shamir},
  title     = {New Cryptographic Primitives Based on Multiword T-Functions},
  booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
               Delhi, India, February 5-7, 2004, Revised Papers},
  pages     = {1--15},
  year      = {2004},
  crossref  = {DBLP:conf/fse/2004},
  url       = {https://doi.org/10.1007/978-3-540-25937-4_1},
  doi       = {10.1007/978-3-540-25937-4_1},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/KlimovS04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LenstraTSKDHL03,
  author    = {Arjen K. Lenstra and
               Eran Tromer and
               Adi Shamir and
               Wil Kortsmit and
               Bruce Dodson and
               James P. Hughes and
               Paul C. Leyland},
  title     = {Factoring Estimates for a 1024-Bit {RSA} Modulus},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  pages     = {55--74},
  year      = {2003},
  crossref  = {DBLP:conf/asiacrypt/2003},
  url       = {https://doi.org/10.1007/978-3-540-40061-5_4},
  doi       = {10.1007/978-3-540-40061-5_4},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/LenstraTSKDHL03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShamirT03,
  author    = {Adi Shamir and
               Eran Tromer},
  title     = {Factoring Large Number with the {TWIRL} Device},
  booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  pages     = {1--26},
  year      = {2003},
  crossref  = {DBLP:conf/crypto/2003},
  url       = {https://doi.org/10.1007/978-3-540-45146-4_1},
  doi       = {10.1007/978-3-540-45146-4_1},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/ShamirT03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Shamir03,
  author    = {Adi Shamir},
  title     = {{RSA} Shortcuts},
  booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
               the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
               Proceedings},
  pages     = {327},
  year      = {2003},
  crossref  = {DBLP:conf/ctrsa/2003},
  url       = {https://doi.org/10.1007/3-540-36563-X_22},
  doi       = {10.1007/3-540-36563-X_22},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/Shamir03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KlimovS03,
  author    = {Alexander Klimov and
               Adi Shamir},
  title     = {Cryptographic Applications of T-Functions},
  booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop,
               {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  pages     = {248--261},
  year      = {2003},
  crossref  = {DBLP:conf/sacrypt/2003},
  url       = {https://doi.org/10.1007/978-3-540-24654-1_18},
  doi       = {10.1007/978-3-540-24654-1_18},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/KlimovS03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/ShamirT03,
  author    = {Adi Shamir and
               Boaz Tsaban},
  title     = {Guaranteeing the diversity of number generators},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {132},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/132},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/ShamirT03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LenstraSTT02,
  author    = {Arjen K. Lenstra and
               Adi Shamir and
               Jim Tomlinson and
               Eran Tromer},
  title     = {Analysis of Bernstein's Factorization Circuit},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  pages     = {1--26},
  year      = {2002},
  crossref  = {DBLP:conf/asiacrypt/2002},
  url       = {https://doi.org/10.1007/3-540-36178-2_1},
  doi       = {10.1007/3-540-36178-2_1},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/LenstraSTT02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KlimovMS02,
  author    = {Alexander Klimov and
               Anton Mityagin and
               Adi Shamir},
  title     = {Analysis of Neural Cryptography},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  pages     = {288--298},
  year      = {2002},
  crossref  = {DBLP:conf/asiacrypt/2002},
  url       = {https://doi.org/10.1007/3-540-36178-2_18},
  doi       = {10.1007/3-540-36178-2_18},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/KlimovMS02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/KlimovS02,
  author    = {Alexander Klimov and
               Adi Shamir},
  title     = {A New Class of Invertible Mappings},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
               Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  pages     = {470--483},
  year      = {2002},
  crossref  = {DBLP:conf/ches/2002},
  url       = {https://doi.org/10.1007/3-540-36400-5_34},
  doi       = {10.1007/3-540-36400-5_34},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/KlimovS02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HalevyS02,
  author    = {Dani Halevy and
               Adi Shamir},
  title     = {The {LSD} Broadcast Encryption Scheme},
  booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  pages     = {47--60},
  year      = {2002},
  crossref  = {DBLP:conf/crypto/2002},
  url       = {https://doi.org/10.1007/3-540-45708-9_4},
  doi       = {10.1007/3-540-45708-9_4},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/HalevyS02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iandc/ShamirT01,
  author    = {Adi Shamir and
               Boaz Tsaban},
  title     = {Guaranteeing the Diversity of Number Generators},
  journal   = {Inf. Comput.},
  volume    = {171},
  number    = {2},
  pages     = {350--363},
  year      = {2001},
  url       = {https://doi.org/10.1006/inco.2001.3045},
  doi       = {10.1006/inco.2001.3045},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iandc/ShamirT01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/RivestST01,
  author    = {Ronald L. Rivest and
               Adi Shamir and
               Yael Tauman},
  title     = {How to Leak a Secret},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Gold Coast, Australia, December 9-13, 2001, Proceedings},
  pages     = {552--565},
  year      = {2001},
  crossref  = {DBLP:conf/asiacrypt/2001},
  url       = {https://doi.org/10.1007/3-540-45682-1_32},
  doi       = {10.1007/3-540-45682-1_32},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/RivestST01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/Shamir01,
  author    = {Adi Shamir},
  title     = {New Directions in Croptography},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
               Workshop, Paris, France, May 14-16, 2001, Proceedings},
  number    = {Generators},
  pages     = {159},
  year      = {2001},
  crossref  = {DBLP:conf/ches/2001},
  url       = {https://doi.org/10.1007/3-540-44709-1_14},
  doi       = {10.1007/3-540-44709-1_14},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/Shamir01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShamirT01,
  author    = {Adi Shamir and
               Yael Tauman},
  title     = {Improved Online/Offline Signature Schemes},
  booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  pages     = {355--367},
  year      = {2001},
  crossref  = {DBLP:conf/crypto/2001},
  url       = {https://doi.org/10.1007/3-540-44647-8_21},
  doi       = {10.1007/3-540-44647-8_21},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/ShamirT01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BiryukovS01,
  author    = {Alex Biryukov and
               Adi Shamir},
  title     = {Structural Cryptanalysis of {SASAS}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
               on the Theory and Application of Cryptographic Techniques, Innsbruck,
               Austria, May 6-10, 2001, Proceeding},
  pages     = {394--405},
  year      = {2001},
  crossref  = {DBLP:conf/eurocrypt/2001},
  url       = {https://doi.org/10.1007/3-540-44987-6_24},
  doi       = {10.1007/3-540-44987-6_24},
  timestamp = {Fri, 26 May 2017 14:09:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/BiryukovS01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/Shamir01,
  author    = {Adi Shamir},
  title     = {SecureClick: {A} Web Payment System with Disposable Credit Card Numbers},
  booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
               Cayman, British West Indies, February 19-22, 2002, Proceedings},
  pages     = {223--233},
  year      = {2001},
  crossref  = {DBLP:conf/fc/2001},
  url       = {https://doi.org/10.1007/3-540-46088-8_20},
  doi       = {10.1007/3-540-46088-8_20},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/Shamir01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/MantinS01,
  author    = {Itsik Mantin and
               Adi Shamir},
  title     = {A Practical Attack on Broadcast {RC4}},
  booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
               Japan, April 2-4, 2001, Revised Papers},
  pages     = {152--164},
  year      = {2001},
  crossref  = {DBLP:conf/fse/2001},
  url       = {https://doi.org/10.1007/3-540-45473-X_13},
  doi       = {10.1007/3-540-45473-X_13},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/MantinS01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FluhrerMS01,
  author    = {Scott R. Fluhrer and
               Itsik Mantin and
               Adi Shamir},
  title     = {Weaknesses in the Key Scheduling Algorithm of {RC4}},
  booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop,
               {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  pages     = {1--24},
  year      = {2001},
  crossref  = {DBLP:conf/sacrypt/2001},
  url       = {https://doi.org/10.1007/3-540-45537-X_1},
  doi       = {10.1007/3-540-45537-X_1},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/FluhrerMS01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0112014,
  author    = {Adi Shamir and
               Boaz Tsaban},
  title     = {Guaranteeing the diversity of number generators},
  journal   = {CoRR},
  volume    = {cs.CR/0112014},
  year      = {2001},
  url       = {http://arxiv.org/abs/cs.CR/0112014},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/corr/cs-CR-0112014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BiryukovS00,
  author    = {Alex Biryukov and
               Adi Shamir},
  title     = {Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  pages     = {1--13},
  year      = {2000},
  crossref  = {DBLP:conf/asiacrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44448-3_1},
  doi       = {10.1007/3-540-44448-3_1},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/BiryukovS00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/Shamir00,
  author    = {Adi Shamir},
  title     = {Protecting Smart Cards from Passive Power Analysis with Detached Power
               Supplies},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
               International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  pages     = {71--77},
  year      = {2000},
  crossref  = {DBLP:conf/ches/2000},
  url       = {https://doi.org/10.1007/3-540-44499-8_5},
  doi       = {10.1007/3-540-44499-8_5},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/Shamir00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LenstraS00,
  author    = {Arjen K. Lenstra and
               Adi Shamir},
  title     = {Analysis and Optimization of the {TWINKLE} Factoring Device},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  pages     = {35--52},
  year      = {2000},
  crossref  = {DBLP:conf/eurocrypt/2000},
  url       = {https://doi.org/10.1007/3-540-45539-6_3},
  doi       = {10.1007/3-540-45539-6_3},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/LenstraS00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CourtoisKPS00,
  author    = {Nicolas Courtois and
               Alexander Klimov and
               Jacques Patarin and
               Adi Shamir},
  title     = {Efficient Algorithms for Solving Overdefined Systems of Multivariate
               Polynomial Equations},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  pages     = {392--407},
  year      = {2000},
  crossref  = {DBLP:conf/eurocrypt/2000},
  url       = {https://doi.org/10.1007/3-540-45539-6_27},
  doi       = {10.1007/3-540-45539-6_27},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/CourtoisKPS00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovSW00,
  author    = {Alex Biryukov and
               Adi Shamir and
               David A. Wagner},
  title     = {Real Time Cryptanalysis of {A5/1} on a {PC}},
  booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
               New York, NY, USA, April 10-12, 2000, Proceedings},
  pages     = {1--18},
  year      = {2000},
  crossref  = {DBLP:conf/fse/2000},
  url       = {https://doi.org/10.1007/3-540-44706-7_1},
  doi       = {10.1007/3-540-44706-7_1},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/BiryukovSW00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/FeigeLS99,
  author    = {Uriel Feige and
               Dror Lapidot and
               Adi Shamir},
  title     = {Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions},
  journal   = {{SIAM} J. Comput.},
  volume    = {29},
  number    = {1},
  pages     = {1--28},
  year      = {1999},
  url       = {https://doi.org/10.1137/S0097539792230010},
  doi       = {10.1137/S0097539792230010},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/FeigeLS99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/Shamir99,
  author    = {Adi Shamir},
  title     = {Factoring Large Numbers with the Twinkle Device (Extended Abstract)},
  booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop,
               CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  pages     = {2--12},
  year      = {1999},
  crossref  = {DBLP:conf/ches/1999},
  url       = {https://doi.org/10.1007/3-540-48059-5_2},
  doi       = {10.1007/3-540-48059-5_2},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/Shamir99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KipnisS99,
  author    = {Aviad Kipnis and
               Adi Shamir},
  title     = {Cryptanalysis of the {HFE} Public Key Cryptosystem by Relinearization},
  booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  pages     = {19--30},
  year      = {1999},
  crossref  = {DBLP:conf/crypto/1999},
  url       = {https://doi.org/10.1007/3-540-48405-1_2},
  doi       = {10.1007/3-540-48405-1_2},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/KipnisS99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamBS99,
  author    = {Eli Biham and
               Alex Biryukov and
               Adi Shamir},
  title     = {Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  pages     = {12--23},
  year      = {1999},
  crossref  = {DBLP:conf/eurocrypt/99},
  url       = {https://doi.org/10.1007/3-540-48910-X_2},
  doi       = {10.1007/3-540-48910-X_2},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/BihamBS99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/ShamirS99,
  author    = {Adi Shamir and
               Nicko van Someren},
  title     = {Playing "Hide and Seek" with Stored Keys},
  booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  pages     = {118--124},
  year      = {1999},
  crossref  = {DBLP:conf/fc/1999},
  url       = {https://doi.org/10.1007/3-540-48390-X_9},
  doi       = {10.1007/3-540-48390-X_9},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/ShamirS99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamBS99,
  author    = {Eli Biham and
               Alex Biryukov and
               Adi Shamir},
  title     = {Miss in the Middle Attacks on {IDEA} and Khufu},
  booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
               Italy, March 24-26, 1999, Proceedings},
  pages     = {124--138},
  year      = {1999},
  crossref  = {DBLP:conf/fse/1999},
  url       = {https://doi.org/10.1007/3-540-48519-8_10},
  doi       = {10.1007/3-540-48519-8_10},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/BihamBS99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NaccacheSS99,
  author    = {David Naccache and
               Adi Shamir and
               Julien P. Stern},
  title     = {How to Copyright a Function?},
  booktitle = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  pages     = {188--196},
  year      = {1999},
  crossref  = {DBLP:conf/pkc/1999},
  url       = {https://doi.org/10.1007/3-540-49162-7_14},
  doi       = {10.1007/3-540-49162-7_14},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/NaccacheSS99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KipnisS98,
  author    = {Aviad Kipnis and
               Adi Shamir},
  title     = {Cryptanalysis of the Oil {\&} Vinegar Signature Scheme},
  booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  pages     = {257--266},
  year      = {1998},
  crossref  = {DBLP:conf/crypto/1998},
  url       = {https://doi.org/10.1007/BFb0055733},
  doi       = {10.1007/BFb0055733},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/KipnisS98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Shamir98,
  author    = {Adi Shamir},
  title     = {Visual Cryptanalysis},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
               on the Theory and Application of Cryptographic Techniques, Espoo,
               Finland, May 31 - June 4, 1998, Proceeding},
  pages     = {201--210},
  year      = {1998},
  crossref  = {DBLP:conf/eurocrypt/98},
  url       = {https://doi.org/10.1007/BFb0054127},
  doi       = {10.1007/BFb0054127},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/Shamir98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ih/AndersonNS98,
  author    = {Ross J. Anderson and
               Roger M. Needham and
               Adi Shamir},
  title     = {The Steganographic File System},
  booktitle = {Information Hiding, Second International Workshop, Portland, Oregon,
               USA, April 14-17, 1998, Proceedings},
  pages     = {73--82},
  year      = {1998},
  crossref  = {DBLP:conf/ih/1998},
  url       = {https://doi.org/10.1007/3-540-49380-8_6},
  doi       = {10.1007/3-540-49380-8_6},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ih/AndersonNS98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BihamBDRS98,
  author    = {Eli Biham and
               Alex Biryukov and
               Orr Dunkelman and
               Eran Richardson and
               Adi Shamir},
  title     = {Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR},
  booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
               August 17-18, 1998, Proceedings},
  pages     = {362--376},
  year      = {1998},
  crossref  = {DBLP:conf/sacrypt/1998},
  url       = {https://doi.org/10.1007/3-540-48892-8_27},
  doi       = {10.1007/3-540-48892-8_27},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/BihamBDRS98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/LapidotS97,
  author    = {Dror Lapidot and
               Adi Shamir},
  title     = {Fully Parallelized Multi-Prover Protocols for NEXP-Time},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {54},
  number    = {2},
  pages     = {215--220},
  year      = {1997},
  url       = {https://doi.org/10.1006/jcss.1997.1238},
  doi       = {10.1006/jcss.1997.1238},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jcss/LapidotS97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamS97,
  author    = {Eli Biham and
               Adi Shamir},
  title     = {Differential Fault Analysis of Secret Key Cryptosystems},
  booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  pages     = {513--525},
  year      = {1997},
  crossref  = {DBLP:conf/crypto/1997},
  url       = {https://doi.org/10.1007/BFb0052259},
  doi       = {10.1007/BFb0052259},
  timestamp = {Mon, 22 May 2017 17:11:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BihamS97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CoppersmithS97,
  author    = {Don Coppersmith and
               Adi Shamir},
  title     = {Lattice Attacks on {NTRU}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  pages     = {52--61},
  year      = {1997},
  crossref  = {DBLP:conf/eurocrypt/97},
  url       = {https://doi.org/10.1007/3-540-69053-0_5},
  doi       = {10.1007/3-540-69053-0_5},
  timestamp = {Mon, 22 May 2017 17:12:28 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/CoppersmithS97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/RivestS96,
  author    = {Ronald L. Rivest and
               Adi Shamir},
  title     = {PayWord and MicroMint: Two Simple Micropayment Schemes},
  booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom,
               April 10-12, 1996, Proceedings},
  pages     = {69--87},
  year      = {1996},
  crossref  = {DBLP:conf/spw/1996},
  url       = {https://doi.org/10.1007/3-540-62494-5_6},
  doi       = {10.1007/3-540-62494-5_6},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/spw/RivestS96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/NaorS96,
  author    = {Moni Naor and
               Adi Shamir},
  title     = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base},
  booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom,
               April 10-12, 1996, Proceedings},
  pages     = {197--202},
  year      = {1996},
  crossref  = {DBLP:conf/spw/1996},
  url       = {https://doi.org/10.1007/3-540-62494-5_18},
  doi       = {10.1007/3-540-62494-5_18},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/spw/NaorS96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NaorS96,
  author    = {Moni Naor and
               Adi Shamir},
  title     = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {1996},
  pages     = {7},
  year      = {1996},
  url       = {http://eprint.iacr.org/1996/007},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/NaorS96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/combinatorica/LapidotS95,
  author    = {Dror Lapidot and
               Adi Shamir},
  title     = {A One-Round, Two-Prover, Zero-Knowledge Protocol for {NP}},
  journal   = {Combinatorica},
  volume    = {15},
  number    = {2},
  pages     = {204--214},
  year      = {1995},
  url       = {https://doi.org/10.1007/BF01200756},
  doi       = {10.1007/BF01200756},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/combinatorica/LapidotS95},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaorS94,
  author    = {Moni Naor and
               Adi Shamir},
  title     = {Visual Cryptography},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  pages     = {1--12},
  year      = {1994},
  crossref  = {DBLP:conf/eurocrypt/94},
  url       = {https://doi.org/10.1007/BFb0053419},
  doi       = {10.1007/BFb0053419},
  timestamp = {Sat, 20 May 2017 15:32:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/NaorS94},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Shamir94,
  author    = {Adi Shamir},
  title     = {Memory Efficient Variants of Public-Key Schemes for Smart Card Applications},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  pages     = {445--449},
  year      = {1994},
  crossref  = {DBLP:conf/eurocrypt/94},
  url       = {https://doi.org/10.1007/BFb0053461},
  doi       = {10.1007/BFb0053461},
  timestamp = {Sat, 20 May 2017 15:32:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/Shamir94},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/daglib/0032320,
  author    = {Eli Biham and
               Adi Shamir},
  title     = {Differential Cryptanalysis of the Data Encryption Standard},
  publisher = {Springer},
  year      = {1993},
  url       = {https://doi.org/10.1007/978-1-4613-9314-6},
  doi       = {10.1007/978-1-4613-9314-6},
  isbn      = {978-1-4613-9316-0},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/books/daglib/0032320},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iandc/FeldmanINNRS93,
  author    = {David Feldman and
               Russell Impagliazzo and
               Moni Naor and
               Noam Nisan and
               Steven Rudich and
               Adi Shamir},
  title     = {On Dice and Coins: Models of Computation for Random Generation},
  journal   = {Inf. Comput.},
  volume    = {104},
  number    = {2},
  pages     = {159--174},
  year      = {1993},
  url       = {https://doi.org/10.1006/inco.1993.1028},
  doi       = {10.1006/inco.1993.1028},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iandc/FeldmanINNRS93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/HastadSS93,
  author    = {Johan H{\aa}stad and
               A. W. Schrift and
               Adi Shamir},
  title     = {The Discrete Logarithm Modulo a Composite Hides O(n) Bits},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {47},
  number    = {3},
  pages     = {376--404},
  year      = {1993},
  url       = {https://doi.org/10.1016/0022-0000(93)90038-X},
  doi       = {10.1016/0022-0000(93)90038-X},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jcss/HastadSS93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/SchriftS93,
  author    = {A. W. Schrift and
               Adi Shamir},
  title     = {Universal Tests for Nonuniform Distributions},
  journal   = {J. Cryptology},
  volume    = {6},
  number    = {3},
  pages     = {119--133},
  year      = {1993},
  url       = {https://doi.org/10.1007/BF00198461},
  doi       = {10.1007/BF00198461},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/SchriftS93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shamir93,
  author    = {Adi Shamir},
  title     = {Efficient Signature Schemes Based on Birational Permutations},
  booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  pages     = {1--12},
  year      = {1993},
  crossref  = {DBLP:conf/crypto/1993},
  url       = {https://doi.org/10.1007/3-540-48329-2_1},
  doi       = {10.1007/3-540-48329-2_1},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/Shamir93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/istcs/Shamir93,
  author    = {Adi Shamir},
  title     = {Practical Cryptography - Recent Trends and Results},
  booktitle = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993,
               Natanya, Israel, June 7-9, 1993, Proceedings},
  pages     = {127},
  year      = {1993},
  crossref  = {DBLP:conf/istcs/1993},
  timestamp = {Tue, 31 May 2016 15:27:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/istcs/Shamir93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Shamir93,
  author    = {Adi Shamir},
  title     = {On the generation of multivariate polynomials which are hard to factor},
  booktitle = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of
               Computing, May 16-18, 1993, San Diego, CA, {USA}},
  pages     = {796--804},
  year      = {1993},
  crossref  = {DBLP:conf/stoc/STOC25},
  url       = {http://doi.acm.org/10.1145/167088.167291},
  doi       = {10.1145/167088.167291},
  timestamp = {Thu, 16 Feb 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/Shamir93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jacm/Shamir92,
  author    = {Adi Shamir},
  title     = {{IP} = {PSPACE}},
  journal   = {J. {ACM}},
  volume    = {39},
  number    = {4},
  pages     = {869--877},
  year      = {1992},
  url       = {http://doi.acm.org/10.1145/146585.146609},
  doi       = {10.1145/146585.146609},
  timestamp = {Thu, 20 Nov 2003 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/jacm/Shamir92},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/FeigeS92,
  author    = {Uriel Feige and
               Adi Shamir},
  title     = {Multi-Oracle Interactive Protocols with Constant Space Verifiers},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {44},
  number    = {2},
  pages     = {259--271},
  year      = {1992},
  url       = {https://doi.org/10.1016/0022-0000(92)90021-A},
  doi       = {10.1016/0022-0000(92)90021-A},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jcss/FeigeS92},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamS92,
  author    = {Eli Biham and
               Adi Shamir},
  title     = {Differential Cryptanalysis of the Full 16-Round {DES}},
  booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  pages     = {487--496},
  year      = {1992},
  crossref  = {DBLP:conf/crypto/1992},
  url       = {https://doi.org/10.1007/3-540-48071-4_34},
  doi       = {10.1007/3-540-48071-4_34},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BihamS92},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BihamS91,
  author    = {Eli Biham and
               Adi Shamir},
  title     = {Differential Cryptanalysis of DES-like Cryptosystems},
  journal   = {J. Cryptology},
  volume    = {4},
  number    = {1},
  pages     = {3--72},
  year      = {1991},
  url       = {https://doi.org/10.1007/BF00630563},
  doi       = {10.1007/BF00630563},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/BihamS91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamS91,
  author    = {Eli Biham and
               Adi Shamir},
  title     = {Differential Cryptanalysis of Snefru, Khafre, REDOC-II, {LOKI} and
               Lucifer},
  booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  pages     = {156--171},
  year      = {1991},
  crossref  = {DBLP:conf/crypto/1991},
  url       = {https://doi.org/10.1007/3-540-46766-1_11},
  doi       = {10.1007/3-540-46766-1_11},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BihamS91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LapidotS91,
  author    = {Dror Lapidot and
               Adi Shamir},
  title     = {A One-Round, Two-Prover, Zero-Knowledge Protocol for {NP}},
  booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  pages     = {213--224},
  year      = {1991},
  crossref  = {DBLP:conf/crypto/1991},
  url       = {https://doi.org/10.1007/3-540-46766-1_16},
  doi       = {10.1007/3-540-46766-1_16},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/LapidotS91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamS91,
  author    = {Eli Biham and
               Adi Shamir},
  title     = {Differential Cryptanalysis of Feal and N-Hash},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
               Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
               1991, Proceedings},
  pages     = {1--16},
  year      = {1991},
  crossref  = {DBLP:conf/eurocrypt/91},
  url       = {https://doi.org/10.1007/3-540-46416-6_1},
  doi       = {10.1007/3-540-46416-6_1},
  timestamp = {Sat, 20 May 2017 15:32:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/BihamS91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/LapidotS91,
  author    = {Dror Lapidot and
               Adi Shamir},
  title     = {Fully Parallelized Multi Prover Protocols for NEXP-Time (Extended
               Abstract)},
  booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
               Puerto Rico, 1-4 October 1991},
  pages     = {13--18},
  year      = {1991},
  crossref  = {DBLP:conf/focs/FOCS32},
  url       = {https://doi.org/10.1109/SFCS.1991.185342},
  doi       = {10.1109/SFCS.1991.185342},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/LapidotS91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamS90,
  author    = {Eli Biham and
               Adi Shamir},
  title     = {Differential Cryptanalysis of DES-like Cryptosystems},
  booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  pages     = {2--21},
  year      = {1990},
  crossref  = {DBLP:conf/crypto/1990},
  url       = {https://doi.org/10.1007/3-540-38424-3_1},
  doi       = {10.1007/3-540-38424-3_1},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BihamS90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LapidotS90,
  author    = {Dror Lapidot and
               Adi Shamir},
  title     = {Publicly Verifiable Non-Interactive Zero-Knowledge Proofs},
  booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  pages     = {353--365},
  year      = {1990},
  crossref  = {DBLP:conf/crypto/1990},
  url       = {https://doi.org/10.1007/3-540-38424-3_26},
  doi       = {10.1007/3-540-38424-3_26},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/LapidotS90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/Shamir90,
  author    = {Adi Shamir},
  title     = {IP=PSPACE},
  booktitle = {31st Annual Symposium on Foundations of Computer Science, St. Louis,
               Missouri, USA, October 22-24, 1990, Volume {I}},
  pages     = {11--15},
  year      = {1990},
  crossref  = {DBLP:conf/focs/FOCS31a},
  url       = {https://doi.org/10.1109/FSCS.1990.89519},
  doi       = {10.1109/FSCS.1990.89519},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/Shamir90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/FeigeLS90,
  author    = {Uriel Feige and
               Dror Lapidot and
               Adi Shamir},
  title     = {Multiple Non-Interactive Zero Knowledge Proofs Based on a Single Random
               String (Extended Abstract)},
  booktitle = {31st Annual Symposium on Foundations of Computer Science, St. Louis,
               Missouri, USA, October 22-24, 1990, Volume {I}},
  pages     = {308--317},
  year      = {1990},
  crossref  = {DBLP:conf/focs/FOCS31a},
  url       = {https://doi.org/10.1109/FSCS.1990.89549},
  doi       = {10.1109/FSCS.1990.89549},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FeigeLS90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/SchriftS90,
  author    = {A. W. Schrift and
               Adi Shamir},
  title     = {The Discrete Log is Very Discreet},
  booktitle = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing,
               May 13-17, 1990, Baltimore, Maryland, {USA}},
  pages     = {405--415},
  year      = {1990},
  crossref  = {DBLP:conf/stoc/STOC22},
  url       = {http://doi.acm.org/10.1145/100216.100271},
  doi       = {10.1145/100216.100271},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/SchriftS90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FeigeS90,
  author    = {Uriel Feige and
               Adi Shamir},
  title     = {Witness Indistinguishable and Witness Hiding Protocols},
  booktitle = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing,
               May 13-17, 1990, Baltimore, Maryland, {USA}},
  pages     = {416--426},
  year      = {1990},
  crossref  = {DBLP:conf/stoc/STOC22},
  url       = {http://doi.acm.org/10.1145/100216.100272},
  doi       = {10.1145/100216.100272},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/FeigeS90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/networks/FiatS89,
  author    = {Amos Fiat and
               Adi Shamir},
  title     = {How to find a battleship},
  journal   = {Networks},
  volume    = {19},
  number    = {3},
  pages     = {361--371},
  year      = {1989},
  url       = {https://doi.org/10.1002/net.3230190306},
  doi       = {10.1002/net.3230190306},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/networks/FiatS89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/FeigeS89,
  author    = {Uriel Feige and
               Adi Shamir},
  title     = {Multi-Oracle Interactive Protocols with Space Bounded Verifiers},
  booktitle = {Proceedings: Fourth Annual Structure in Complexity Theory Conference,
               University of Oregon, Eugene, Oregon, USA, June 19-22, 1989},
  pages     = {158--164},
  year      = {1989},
  crossref  = {DBLP:conf/coco/1989},
  url       = {https://doi.org/10.1109/SCT.1989.41822},
  doi       = {10.1109/SCT.1989.41822},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/FeigeS89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FeigeS89,
  author    = {Uriel Feige and
               Adi Shamir},
  title     = {Zero Knowledge Proofs of Knowledge in Two Rounds},
  booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  pages     = {526--544},
  year      = {1989},
  crossref  = {DBLP:conf/crypto/1989},
  url       = {https://doi.org/10.1007/0-387-34805-0_46},
  doi       = {10.1007/0-387-34805-0_46},
  timestamp = {Fri, 19 May 2017 13:10:48 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/FeigeS89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shamir89,
  author    = {Adi Shamir},
  title     = {An Efficient Identification Scheme Based on Permuted Kernels (Extended
               Abstract)},
  booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  pages     = {606--609},
  year      = {1989},
  crossref  = {DBLP:conf/crypto/1989},
  url       = {https://doi.org/10.1007/0-387-34805-0_54},
  doi       = {10.1007/0-387-34805-0_54},
  timestamp = {Fri, 19 May 2017 13:10:48 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/Shamir89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/FeigeS89,
  author    = {Uriel Feige and
               Adi Shamir},
  title     = {On Expected Polynomial Time Simulation of Zero Knowledge Protocols},
  booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  pages     = {155--160},
  year      = {1989},
  crossref  = {DBLP:conf/dimacs/dimacs2},
  timestamp = {Wed, 13 Jan 2016 17:47:42 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/dimacs/FeigeS89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/FiatMSST89,
  author    = {Amos Fiat and
               Shahar Moses and
               Adi Shamir and
               Ilan Shimshoni and
               G{\'{a}}bor Tardos},
  title     = {Planning and Learning in Permutation Groups},
  booktitle = {30th Annual Symposium on Foundations of Computer Science, Research
               Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  pages     = {274--279},
  year      = {1989},
  crossref  = {DBLP:conf/focs/FOCS30},
  url       = {https://doi.org/10.1109/SFCS.1989.63490},
  doi       = {10.1109/SFCS.1989.63490},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FiatMSST89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FeldmanINNRS89,
  author    = {David Feldman and
               Russell Impagliazzo and
               Moni Naor and
               Noam Nisan and
               Steven Rudich and
               Adi Shamir},
  title     = {On Dice and Coins: Models of Computation for Random Generation},
  booktitle = {Automata, Languages and Programming, 16th International Colloquium,
               ICALP89, Stresa, Italy, July 11-15, 1989, Proceedings},
  pages     = {319--340},
  year      = {1989},
  crossref  = {DBLP:conf/icalp/1989},
  url       = {https://doi.org/10.1007/BFb0035769},
  doi       = {10.1007/BFb0035769},
  timestamp = {Thu, 15 Jun 2017 21:39:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/FeldmanINNRS89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/FeigeFS88,
  author    = {Uriel Feige and
               Amos Fiat and
               Adi Shamir},
  title     = {Zero-Knowledge Proofs of Identity},
  journal   = {J. Cryptology},
  volume    = {1},
  number    = {2},
  pages     = {77--94},
  year      = {1988},
  url       = {https://doi.org/10.1007/BF02351717},
  doi       = {10.1007/BF02351717},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/FeigeFS88},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/FriezeHKLS88,
  author    = {Alan M. Frieze and
               Johan H{\aa}stad and
               Ravi Kannan and
               J. C. Lagarias and
               Adi Shamir},
  title     = {Reconstructing Truncated Integer Variables Satisfying Linear Congruences},
  journal   = {{SIAM} J. Comput.},
  volume    = {17},
  number    = {2},
  pages     = {262--280},
  year      = {1988},
  url       = {https://doi.org/10.1137/0217016},
  doi       = {10.1137/0217016},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/FriezeHKLS88},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicaliS88a,
  author    = {Silvio Micali and
               Adi Shamir},
  title     = {An Improvement of the Fiat-Shamir Identification and Signature Scheme},
  booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  pages     = {244--247},
  year      = {1988},
  crossref  = {DBLP:conf/crypto/1988},
  url       = {https://doi.org/10.1007/0-387-34799-2_18},
  doi       = {10.1007/0-387-34799-2_18},
  timestamp = {Fri, 19 May 2017 13:10:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/MicaliS88a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FeigeST88,
  author    = {Uriel Feige and
               Adi Shamir and
               Moshe Tennenholtz},
  title     = {The Noisy Oracle Problem},
  booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  pages     = {284--296},
  year      = {1988},
  crossref  = {DBLP:conf/crypto/1988},
  url       = {https://doi.org/10.1007/0-387-34799-2_22},
  doi       = {10.1007/0-387-34799-2_22},
  timestamp = {Fri, 19 May 2017 13:10:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/FeigeST88},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MatiasS87,
  author    = {Yossi Matias and
               Adi Shamir},
  title     = {A Video Scrambling Technique Based On Space Filling Curves},
  booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
               and Applications of Cryptographic Techniques, Santa Barbara, California,
               USA, August 16-20, 1987, Proceedings},
  pages     = {398--417},
  year      = {1987},
  crossref  = {DBLP:conf/crypto/1987},
  url       = {https://doi.org/10.1007/3-540-48184-2_35},
  doi       = {10.1007/3-540-48184-2_35},
  timestamp = {Fri, 19 May 2017 13:10:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/MatiasS87},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FeigeFS87,
  author    = {Uriel Feige and
               Amos Fiat and
               Adi Shamir},
  title     = {Zero Knowledge Proofs of Identity},
  booktitle = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing,
               1987, New York, New York, {USA}},
  pages     = {210--217},
  year      = {1987},
  crossref  = {DBLP:conf/stoc/STOC19},
  url       = {http://doi.acm.org/10.1145/28395.28419},
  doi       = {10.1145/28395.28419},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/FeigeFS87},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/FiatS86,
  author    = {Amos Fiat and
               Adi Shamir},
  title     = {Polymorphic Arrays: {A} Novel {VLSI} Layout for Systolic Computers},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {33},
  number    = {1},
  pages     = {47--65},
  year      = {1986},
  url       = {https://doi.org/10.1016/0022-0000(86)90042-5},
  doi       = {10.1016/0022-0000(86)90042-5},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/jcss/FiatS86},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FiatS86,
  author    = {Amos Fiat and
               Adi Shamir},
  title     = {How to Prove Yourself: Practical Solutions to Identification and Signature
               Problems},
  booktitle = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
               USA, 1986, Proceedings},
  pages     = {186--194},
  year      = {1986},
  crossref  = {DBLP:conf/crypto/1986},
  url       = {https://doi.org/10.1007/3-540-47721-7_12},
  doi       = {10.1007/3-540-47721-7_12},
  timestamp = {Fri, 19 May 2017 13:10:48 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/FiatS86},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icpp/SenSS86,
  author    = {Sandeep Sen and
               Isaac D. Scherson and
               Adi Shamir},
  title     = {Shear Sort: {A} True Two-Dimensional Sorting Techniques for {VLSI}
               Networks},
  booktitle = {International Conference on Parallel Processing, ICPP'86, University
               Park, PA, USA, August 1986.},
  pages     = {903--908},
  year      = {1986},
  crossref  = {DBLP:conf/icpp/1986},
  timestamp = {Mon, 28 Jul 2014 17:06:02 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icpp/SenSS86},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/SchnorrS86,
  author    = {Claus{-}Peter Schnorr and
               Adi Shamir},
  title     = {An Optimal Sorting Algorithm for Mesh Connected Computers},
  booktitle = {Proceedings of the 18th Annual {ACM} Symposium on Theory of Computing,
               May 28-30, 1986, Berkeley, California, {USA}},
  pages     = {255--263},
  year      = {1986},
  crossref  = {DBLP:conf/stoc/STOC18},
  url       = {http://doi.acm.org/10.1145/12130.12156},
  doi       = {10.1145/12130.12156},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/SchnorrS86},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/ShallitS85,
  author    = {Jeffrey Shallit and
               Adi Shamir},
  title     = {Number-Theoretic Functions Which Are Equivalent to Number of Divisors},
  journal   = {Inf. Process. Lett.},
  volume    = {20},
  number    = {3},
  pages     = {151--153},
  year      = {1985},
  url       = {https://doi.org/10.1016/0020-0190(85)90084-5},
  doi       = {10.1016/0020-0190(85)90084-5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ipl/ShallitS85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EvenGS85,
  author    = {Shimon Even and
               Oded Goldreich and
               Adi Shamir},
  title     = {On the Security of Ping-Pong Protocols when Implemented using the
               {RSA}},
  booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
               USA, August 18-22, 1985, Proceedings},
  pages     = {58--72},
  year      = {1985},
  crossref  = {DBLP:conf/crypto/1985},
  url       = {https://doi.org/10.1007/3-540-39799-X_7},
  doi       = {10.1007/3-540-39799-X_7},
  timestamp = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/EvenGS85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shamir85,
  author    = {Adi Shamir},
  title     = {On the Security of {DES}},
  booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
               USA, August 18-22, 1985, Proceedings},
  pages     = {280--281},
  year      = {1985},
  crossref  = {DBLP:conf/crypto/1985},
  url       = {https://doi.org/10.1007/3-540-39799-X_22},
  doi       = {10.1007/3-540-39799-X_22},
  timestamp = {Fri, 19 May 2017 12:26:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/Shamir85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RivestS85,
  author    = {Ronald L. Rivest and
               Adi Shamir},
  title     = {Efficient Factoring Based on Partial Information},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '85, Workshop on the Theory and
               Application of of Cryptographic Techniques, Linz, Austria, April 1985,
               Proceedings},
  pages     = {31--34},
  year      = {1985},
  crossref  = {DBLP:conf/eurocrypt/85},
  url       = {https://doi.org/10.1007/3-540-39805-8_3},
  doi       = {10.1007/3-540-39805-8_3},
  timestamp = {Fri, 19 May 2017 12:26:24 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/RivestS85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icpp/FiatSS85,
  author    = {Amos Fiat and
               Adi Shamir and
               Ehud Y. Shapiro},
  title     = {Polymorphic Arrays: An Architecture for a Programmable Systolic Machine},
  booktitle = {International Conference on Parallel Processing, ICPP'85, University
               Park, PA, USA, August 1985.},
  pages     = {112--117},
  year      = {1985},
  crossref  = {DBLP:conf/icpp/1985},
  timestamp = {Mon, 28 Jul 2014 17:06:01 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icpp/FiatSS85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/HastadS85,
  author    = {Johan H{\aa}stad and
               Adi Shamir},
  title     = {The Cryptographic Security of Truncated Linearly Related Variables},
  booktitle = {Proceedings of the 17th Annual {ACM} Symposium on Theory of Computing,
               May 6-8, 1985, Providence, Rhode Island, {USA}},
  pages     = {356--362},
  year      = {1985},
  crossref  = {DBLP:conf/stoc/STOC17},
  url       = {http://doi.acm.org/10.1145/22145.22184},
  doi       = {10.1145/22145.22184},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/HastadS85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/RivestS84,
  author    = {Ronald L. Rivest and
               Adi Shamir},
  title     = {How to Expose an Eavesdropper},
  journal   = {Commun. {ACM}},
  volume    = {27},
  number    = {4},
  pages     = {393--395},
  year      = {1984},
  url       = {http://doi.acm.org/10.1145/358027.358053},
  doi       = {10.1145/358027.358053},
  timestamp = {Tue, 07 Jun 2011 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cacm/RivestS84},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/ShamirS84,
  author    = {Adi Shamir and
               Claus{-}Peter Schnorr},
  title     = {Cryptanalysis of Certain Variants of Rabin's Signature Scheme},
  journal   = {Inf. Process. Lett.},
  volume    = {19},
  number    = {3},
  pages     = {113--115},
  year      = {1984},
  url       = {https://doi.org/10.1016/0020-0190(84)90088-7},
  doi       = {10.1016/0020-0190(84)90088-7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ipl/ShamirS84},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/FiatS84,
  author    = {Amos Fiat and
               Adi Shamir},
  title     = {Generalized 'write-once' memories},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {30},
  number    = {3},
  pages     = {470--479},
  year      = {1984},
  url       = {https://doi.org/10.1109/TIT.1984.1056918},
  doi       = {10.1109/TIT.1984.1056918},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/FiatS84},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/Shamir84,
  author    = {Adi Shamir},
  title     = {A polynomial-time algorithm for breaking the basic Merkle-Hellman
               cryptosystem},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {30},
  number    = {5},
  pages     = {699--704},
  year      = {1984},
  url       = {https://doi.org/10.1109/TIT.1984.1056964},
  doi       = {10.1109/TIT.1984.1056964},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/Shamir84},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OngSS84,
  author    = {H. Ong and
               Claus{-}Peter Schnorr and
               Adi Shamir},
  title     = {Efficient Signature Schemes Based on Polynomial Equations},
  booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
               California, USA, August 19-22, 1984, Proceedings},
  pages     = {37--46},
  year      = {1984},
  crossref  = {DBLP:conf/crypto/1984},
  url       = {https://doi.org/10.1007/3-540-39568-7_4},
  doi       = {10.1007/3-540-39568-7_4},
  timestamp = {Fri, 19 May 2017 12:26:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/OngSS84},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shamir84,
  author    = {Adi Shamir},
  title     = {Identity-Based Cryptosystems and Signature Schemes},
  booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
               California, USA, August 19-22, 1984, Proceedings},
  pages     = {47--53},
  year      = {1984},
  crossref  = {DBLP:conf/crypto/1984},
  url       = {https://doi.org/10.1007/3-540-39568-7_5},
  doi       = {10.1007/3-540-39568-7_5},
  timestamp = {Fri, 19 May 2017 12:26:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/Shamir84},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/FiatS84,
  author    = {Amos Fiat and
               Adi Shamir},
  title     = {Polymorphic Arrays: {A} Novel {VLSI} Layout for Systolic Computers},
  booktitle = {25th Annual Symposium on Foundations of Computer Science, West Palm
               Beach, Florida, USA, 24-26 October 1984},
  pages     = {37--45},
  year      = {1984},
  crossref  = {DBLP:conf/focs/FOCS25},
  url       = {https://doi.org/10.1109/SFCS.1984.715899},
  doi       = {10.1109/SFCS.1984.715899},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FiatS84},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/OngSS84,
  author    = {H. Ong and
               Claus{-}Peter Schnorr and
               Adi Shamir},
  title     = {An Efficient Signature Scheme Based on Quadratic Equations},
  booktitle = {Proceedings of the 16th Annual {ACM} Symposium on Theory of Computing,
               April 30 - May 2, 1984, Washington, DC, {USA}},
  pages     = {208--216},
  year      = {1984},
  crossref  = {DBLP:conf/stoc/STOC16},
  url       = {http://doi.acm.org/10.1145/800057.808683},
  doi       = {10.1145/800057.808683},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/OngSS84},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/RivestSA83,
  author    = {Ronald L. Rivest and
               Adi Shamir and
               Leonard M. Adleman},
  title     = {A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
               (Reprint)},
  journal   = {Commun. {ACM}},
  volume    = {26},
  number    = {1},
  pages     = {96--99},
  year      = {1983},
  url       = {http://doi.acm.org/10.1145/357980.358017},
  doi       = {10.1145/357980.358017},
  timestamp = {Tue, 07 Jun 2011 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cacm/RivestSA83},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/Shamir83,
  author    = {Adi Shamir},
  title     = {Embedding Cryptographic Trapdoors in Arbitrary Knapsack Systems},
  journal   = {Inf. Process. Lett.},
  volume    = {17},
  number    = {2},
  pages     = {77--79},
  year      = {1983},
  url       = {https://doi.org/10.1016/0020-0190(83)90074-1},
  doi       = {10.1016/0020-0190(83)90074-1},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ipl/Shamir83},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tocs/Shamir83,
  author    = {Adi Shamir},
  title     = {On the Generation of Cryptographically Strong Pseudorandom Sequences},
  journal   = {{ACM} Trans. Comput. Syst.},
  volume    = {1},
  number    = {1},
  pages     = {38--44},
  year      = {1983},
  url       = {http://doi.acm.org/10.1145/357353.357357},
  doi       = {10.1145/357353.357357},
  timestamp = {Mon, 03 Apr 2006 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tocs/Shamir83},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Ben-OrCS83,
  author    = {Michael Ben{-}Or and
               Benny Chor and
               Adi Shamir},
  title     = {On the Cryptographic Security of Single {RSA} Bits},
  booktitle = {Proceedings of the 15th Annual {ACM} Symposium on Theory of Computing,
               25-27 April, 1983, Boston, Massachusetts, {USA}},
  pages     = {421--430},
  year      = {1983},
  crossref  = {DBLP:conf/stoc/STOC15},
  url       = {http://doi.acm.org/10.1145/800061.808773},
  doi       = {10.1145/800061.808773},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/Ben-OrCS83},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iandc/RivestS82,
  author    = {Ronald L. Rivest and
               Adi Shamir},
  title     = {How to Reuse a "Write-Once" Memory},
  journal   = {Information and Control},
  volume    = {55},
  number    = {1-3},
  pages     = {1--19},
  year      = {1982},
  url       = {https://doi.org/10.1016/S0019-9958(82)90344-8},
  doi       = {10.1016/S0019-9958(82)90344-8},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iandc/RivestS82},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shamir82,
  author    = {Adi Shamir},
  title     = {A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman
               Cryptosystem},
  booktitle = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara,
               California, USA, August 23-25, 1982.},
  pages     = {279--288},
  year      = {1982},
  crossref  = {DBLP:conf/crypto/1982},
  timestamp = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/Shamir82},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/Shamir82,
  author    = {Adi Shamir},
  title     = {A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman
               Cryptosystem},
  booktitle = {23rd Annual Symposium on Foundations of Computer Science, Chicago,
               Illinois, USA, 3-5 November 1982},
  pages     = {145--152},
  year      = {1982},
  crossref  = {DBLP:conf/focs/FOCS23},
  url       = {https://doi.org/10.1109/SFCS.1982.5},
  doi       = {10.1109/SFCS.1982.5},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/Shamir82},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/RivestS82,
  author    = {Ronald L. Rivest and
               Adi Shamir},
  title     = {How to Reuse a "Write-Once" Memory (Preliminary Version)},
  booktitle = {Proceedings of the 14th Annual {ACM} Symposium on Theory of Computing,
               May 5-7, 1982, San Francisco, California, {USA}},
  pages     = {105--113},
  year      = {1982},
  crossref  = {DBLP:conf/stoc/STOC14},
  url       = {http://doi.acm.org/10.1145/800070.802182},
  doi       = {10.1145/800070.802182},
  timestamp = {Sun, 21 May 2017 00:22:29 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/RivestS82},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/SchroeppelS81,
  author    = {Richard Schroeppel and
               Adi Shamir},
  title     = {A T=O(2\({}^{\mbox{n/2}}\)), S=O(2\({}^{\mbox{n/4}}\)) Algorithm for
               Certain NP-Complete Problems},
  journal   = {{SIAM} J. Comput.},
  volume    = {10},
  number    = {3},
  pages     = {456--464},
  year      = {1981},
  url       = {https://doi.org/10.1137/0210033},
  doi       = {10.1137/0210033},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/SchroeppelS81},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shamir81,
  author    = {Adi Shamir},
  title     = {The Generation of Cryptographically Strong Pseudo-Random Sequences},
  booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE}
               Workshop on Communications Security, Santa Barbara, California, USA,
               August 24-26, 1981.},
  pages     = {1},
  year      = {1981},
  crossref  = {DBLP:conf/crypto/1981},
  timestamp = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/Shamir81},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Shamir81,
  author    = {Adi Shamir},
  title     = {On the Generation of Cryptographically Strong Pseudo-Random Sequences},
  booktitle = {Automata, Languages and Programming, 8th Colloquium, Acre (Akko),
               Israel, July 13-17, 1981, Proceedings},
  pages     = {544--550},
  year      = {1981},
  crossref  = {DBLP:conf/icalp/1981},
  url       = {https://doi.org/10.1007/3-540-10843-2_43},
  doi       = {10.1007/3-540-10843-2_43},
  timestamp = {Fri, 19 May 2017 12:26:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/Shamir81},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/ShamirZ80,
  author    = {Adi Shamir and
               Richard Zippel},
  title     = {On the security of the Merkle- Hellman cryptographic scheme (Corresp.)},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {26},
  number    = {3},
  pages     = {339--340},
  year      = {1980},
  url       = {https://doi.org/10.1109/TIT.1980.1056197},
  doi       = {10.1109/TIT.1980.1056197},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/ShamirZ80},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Shamir80,
  author    = {Adi Shamir},
  title     = {On the Power of Commutativity in Cryptography},
  booktitle = {Automata, Languages and Programming, 7th Colloquium, Noordweijkerhout,
               The Netherland, July 14-18, 1980, Proceedings},
  pages     = {582--595},
  year      = {1980},
  crossref  = {DBLP:conf/icalp/1980},
  url       = {https://doi.org/10.1007/3-540-10003-2_100},
  doi       = {10.1007/3-540-10003-2_100},
  timestamp = {Fri, 19 May 2017 12:26:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/Shamir80},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/Shamir80,
  author    = {Adi Shamir},
  title     = {The Cryptographic Security of Compact Knapsacks (Preliminary Report)},
  booktitle = {Proceedings of the 1980 {IEEE} Symposium on Security and Privacy,
               Oakland, California, USA, April 14-16, 1980},
  pages     = {94--99},
  year      = {1980},
  crossref  = {DBLP:conf/sp/1980},
  url       = {https://doi.org/10.1109/SP.1980.10005},
  doi       = {10.1109/SP.1980.10005},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sp/Shamir80},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/Shamir79,
  author    = {Adi Shamir},
  title     = {How to Share a Secret},
  journal   = {Commun. {ACM}},
  volume    = {22},
  number    = {11},
  pages     = {612--613},
  year      = {1979},
  url       = {http://doi.acm.org/10.1145/359168.359176},
  doi       = {10.1145/359168.359176},
  timestamp = {Tue, 07 Jun 2011 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cacm/Shamir79},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/Shamir79,
  author    = {Adi Shamir},
  title     = {Factoring Numbers in O(log n) Arithmetic Steps},
  journal   = {Inf. Process. Lett.},
  volume    = {8},
  number    = {1},
  pages     = {28--31},
  year      = {1979},
  url       = {https://doi.org/10.1016/0020-0190(79)90087-5},
  doi       = {10.1016/0020-0190(79)90087-5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ipl/Shamir79},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/Shamir79,
  author    = {Adi Shamir},
  title     = {A Linear Time Algorithm for Finding Minimum Cutsets in Reducible Graphs},
  journal   = {{SIAM} J. Comput.},
  volume    = {8},
  number    = {4},
  pages     = {645--655},
  year      = {1979},
  url       = {https://doi.org/10.1137/0208051},
  doi       = {10.1137/0208051},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/Shamir79},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/SchroeppelS79,
  author    = {Richard Schroeppel and
               Adi Shamir},
  title     = {A {T} S{\^{}}2 = O(2{\^{}}n) Time/Space Tradeoff for Certain NP-Complete
               Problems},
  booktitle = {20th Annual Symposium on Foundations of Computer Science, San Juan,
               Puerto Rico, 29-31 October 1979},
  pages     = {328--336},
  year      = {1979},
  crossref  = {DBLP:conf/focs/FOCS20},
  url       = {https://doi.org/10.1109/SFCS.1979.3},
  doi       = {10.1109/SFCS.1979.3},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/SchroeppelS79},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Shamir79,
  author    = {Adi Shamir},
  title     = {On the Cryptocomplexity of Knapsack Systems},
  booktitle = {Proceedings of the 11h Annual {ACM} Symposium on Theory of Computing,
               April 30 - May 2, 1979, Atlanta, Georgia, {USA}},
  pages     = {118--129},
  year      = {1979},
  crossref  = {DBLP:conf/stoc/STOC11},
  url       = {http://doi.acm.org/10.1145/800135.804405},
  doi       = {10.1145/800135.804405},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/Shamir79},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/RivestSA78,
  author    = {Ronald L. Rivest and
               Adi Shamir and
               Leonard M. Adleman},
  title     = {A Method for Obtaining Digital Signatures and Public-Key Cryptosystems},
  journal   = {Commun. {ACM}},
  volume    = {21},
  number    = {2},
  pages     = {120--126},
  year      = {1978},
  url       = {http://doi.acm.org/10.1145/359340.359342},
  doi       = {10.1145/359340.359342},
  timestamp = {Tue, 07 Jun 2011 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cacm/RivestSA78},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcs/MannaS78,
  author    = {Zohar Manna and
               Adi Shamir},
  title     = {The Convergence of Functions to Fixedpoints of Recursive Definitions},
  journal   = {Theor. Comput. Sci.},
  volume    = {6},
  pages     = {109--141},
  year      = {1978},
  url       = {https://doi.org/10.1016/0304-3975(78)90033-6},
  doi       = {10.1016/0304-3975(78)90033-6},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tcs/MannaS78},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/MannaS77,
  author    = {Zohar Manna and
               Adi Shamir},
  title     = {The Optimal Approach to Recursive Programs},
  journal   = {Commun. {ACM}},
  volume    = {20},
  number    = {11},
  pages     = {824--831},
  year      = {1977},
  url       = {http://doi.acm.org/10.1145/359863.359885},
  doi       = {10.1145/359863.359885},
  timestamp = {Tue, 07 Jun 2011 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cacm/MannaS77},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ShamirW77,
  author    = {Adi Shamir and
               William W. Wadge},
  title     = {Data Types as Objects},
  booktitle = {Automata, Languages and Programming, Fourth Colloquium, University
               of Turku, Finland, July 18-22, 1977, Proceedings},
  pages     = {465--479},
  year      = {1977},
  crossref  = {DBLP:conf/icalp/1977},
  url       = {https://doi.org/10.1007/3-540-08342-1_36},
  doi       = {10.1007/3-540-08342-1_36},
  timestamp = {Fri, 19 May 2017 12:26:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/ShamirW77},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/MannaS76,
  author    = {Zohar Manna and
               Adi Shamir},
  title     = {The Theoretical Aspects of the Optimal Fixed Point},
  journal   = {{SIAM} J. Comput.},
  volume    = {5},
  number    = {3},
  pages     = {414--426},
  year      = {1976},
  url       = {https://doi.org/10.1137/0205033},
  doi       = {10.1137/0205033},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/MannaS76},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/EvenIS76,
  author    = {Shimon Even and
               Alon Itai and
               Adi Shamir},
  title     = {On the Complexity of Timetable and Multicommodity Flow Problems},
  journal   = {{SIAM} J. Comput.},
  volume    = {5},
  number    = {4},
  pages     = {691--703},
  year      = {1976},
  url       = {https://doi.org/10.1137/0205048},
  doi       = {10.1137/0205048},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/siamcomp/EvenIS76},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/EvenIS75,
  author    = {Shimon Even and
               Alon Itai and
               Adi Shamir},
  title     = {On the Complexity of Timetable and Multi-Commodity Flow Problems},
  booktitle = {16th Annual Symposium on Foundations of Computer Science, Berkeley,
               California, USA, October 13-15, 1975},
  pages     = {184--193},
  year      = {1975},
  crossref  = {DBLP:conf/focs/FOCS16},
  url       = {https://doi.org/10.1109/SFCS.1975.21},
  doi       = {10.1109/SFCS.1975.21},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/EvenIS75},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/MannaS75,
  author    = {Zohar Manna and
               Adi Shamir},
  title     = {The Optimal Fixedpoint of Recursive Programs},
  booktitle = {Proceedings of the 7th Annual {ACM} Symposium on Theory of Computing,
               May 5-7, 1975, Albuquerque, New Mexico, {USA}},
  pages     = {194--206},
  year      = {1975},
  crossref  = {DBLP:conf/stoc/STOC7},
  url       = {http://doi.acm.org/10.1145/800116.803769},
  doi       = {10.1145/800116.803769},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/MannaS75},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2017,
  title     = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7957740},
  isbn      = {978-1-5090-5533-3},
  timestamp = {Tue, 27 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sp/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-2,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9815},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53008-5},
  doi       = {10.1007/978-3-662-53008-5},
  isbn      = {978-3-662-53007-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2016,
  title     = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7467055},
  isbn      = {978-1-5090-1751-5},
  timestamp = {Sun, 05 Jun 2016 10:00:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurosp/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-1,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9215},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47989-6},
  doi       = {10.1007/978-3-662-47989-6},
  isbn      = {978-3-662-47988-9},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2015-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/latincrypt/2015,
  editor    = {Kristin E. Lauter and
               Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title     = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9230},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8},
  doi       = {10.1007/978-3-319-22174-8},
  isbn      = {978-3-319-22173-1},
  timestamp = {Wed, 24 May 2017 08:28:38 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/latincrypt/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014-1,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8873},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45611-8},
  doi       = {10.1007/978-3-662-45611-8},
  isbn      = {978-3-662-45610-1},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-2,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8617},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44381-1},
  doi       = {10.1007/978-3-662-44381-1},
  isbn      = {978-3-662-44380-4},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2014-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2014w,
  editor    = {Rainer B{\"{o}}hme and
               Michael Brenner and
               Tyler Moore and
               Matthew Smith},
  title     = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
               and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8438},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44774-1},
  doi       = {10.1007/978-3-662-44774-1},
  isbn      = {978-3-662-44773-4},
  timestamp = {Fri, 26 May 2017 00:50:27 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/2014w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2014,
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46706-0},
  doi       = {10.1007/978-3-662-46706-0},
  isbn      = {978-3-662-46705-3},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2014,
  editor    = {Willi Meier and
               Debdeep Mukhopadhyay},
  title     = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8885},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13039-2},
  doi       = {10.1007/978-3-319-13039-2},
  isbn      = {978-3-319-13038-5},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/indocrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-1,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8269},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42033-7},
  doi       = {10.1007/978-3-642-42033-7},
  isbn      = {978-3-642-42032-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2013-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2013,
  editor    = {Ahmad{-}Reza Sadeghi},
  title     = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7859},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39884-1},
  doi       = {10.1007/978-3-642-39884-1},
  isbn      = {978-3-642-39883-4},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2013,
  editor    = {Shiho Moriai},
  title     = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
               Singapore, March 11-13, 2013. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8424},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-43933-3},
  doi       = {10.1007/978-3-662-43933-3},
  isbn      = {978-3-662-43932-6},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acm/2012t,
  title     = {{ACM} Turing Centenary Celebration, {ACM-TURING} '12, San Francisco,
               California, USA, June 15-16, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://doi.acm.org/10.1145/2322176},
  doi       = {10.1145/2322176},
  isbn      = {978-1-4503-3919-3},
  timestamp = {Tue, 19 Apr 2016 19:37:25 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acm/2012t},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2012,
  editor    = {Reihaneh Safavi{-}Naini and
               Ran Canetti},
  title     = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7417},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5},
  doi       = {10.1007/978-3-642-32009-5},
  isbn      = {978-3-642-32008-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2012,
  editor    = {David Pointcheval and
               Thomas Johansson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7237},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4},
  doi       = {10.1007/978-3-642-29011-4},
  isbn      = {978-3-642-29010-7},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2012,
  editor    = {Anne Canteaut},
  title     = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
               Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7549},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34047-5},
  doi       = {10.1007/978-3-642-34047-5},
  isbn      = {978-3-642-34046-8},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2011,
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0},
  doi       = {10.1007/978-3-642-25385-0},
  isbn      = {978-3-642-25384-3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2011,
  editor    = {Antoine Joux},
  title     = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6733},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9},
  doi       = {10.1007/978-3-642-21702-9},
  isbn      = {978-3-642-21701-2},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2011,
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Encyclopedia of Cryptography and Security, 2nd Ed},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5},
  doi       = {10.1007/978-1-4419-5906-5},
  isbn      = {978-1-4419-5905-8},
  timestamp = {Tue, 16 May 2017 14:01:51 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2010,
  editor    = {Masayuki Abe},
  title     = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6477},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8},
  doi       = {10.1007/978-3-642-17373-8},
  isbn      = {978-3-642-17372-1},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2010,
  editor    = {Stefan Mangard and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
               Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6225},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15031-9},
  doi       = {10.1007/978-3-642-15031-9},
  isbn      = {978-3-642-15030-2},
  timestamp = {Sun, 21 May 2017 00:18:34 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor    = {Tal Rabin},
  title     = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7},
  doi       = {10.1007/978-3-642-14623-7},
  isbn      = {978-3-642-14622-0},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2010,
  editor    = {Henri Gilbert},
  title     = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               French Riviera, May 30 - June 3, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6110},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5},
  doi       = {10.1007/978-3-642-13190-5},
  isbn      = {978-3-642-13189-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2010,
  editor    = {Luca Breveglieri and
               Marc Joye and
               Israel Koren and
               David Naccache and
               Ingrid Verbauwhede},
  title     = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
               2010, Santa Barbara, California, USA, 21 August 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5575321},
  isbn      = {978-0-7695-4169-3},
  timestamp = {Tue, 12 May 2015 17:11:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fdtc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2009,
  editor    = {Antoine Joux},
  title     = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5479},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9},
  doi       = {10.1007/978-3-642-01001-9},
  isbn      = {978-3-642-01000-2},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2009,
  editor    = {Orr Dunkelman},
  title     = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5665},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03317-9},
  doi       = {10.1007/978-3-642-03317-9},
  isbn      = {978-3-642-03316-2},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9031,
  editor    = {Helena Handschuh and
               Stefan Lucks and
               Bart Preneel and
               Phillip Rogaway},
  title     = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {09031},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year      = {2009},
  url       = {http://drops.dagstuhl.de/portals/09031/},
  timestamp = {Wed, 08 Apr 2015 13:43:42 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/dagstuhl/2009P9031},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2008,
  editor    = {Elisabeth Oswald and
               Pankaj Rohatgi},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
               Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5154},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85053-3},
  doi       = {10.1007/978-3-540-85053-3},
  isbn      = {978-3-540-85052-6},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2008,
  editor    = {David A. Wagner},
  title     = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5157},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5},
  doi       = {10.1007/978-3-540-85174-5},
  isbn      = {978-3-540-85173-8},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2008,
  editor    = {Nigel P. Smart},
  title     = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4965},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-78967-3},
  doi       = {10.1007/978-3-540-78967-3},
  isbn      = {978-3-540-78966-6},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2008,
  editor    = {Kaisa Nyberg},
  title     = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
               Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5086},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-71039-4},
  doi       = {10.1007/978-3-540-71039-4},
  isbn      = {978-3-540-71038-7},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/2008-2,
  editor    = {Luca Aceto and
               Ivan Damg{\aa}rd and
               Leslie Ann Goldberg and
               Magn{\'{u}}s M. Halld{\'{o}}rsson and
               Anna Ing{\'{o}}lfsd{\'{o}}ttir and
               Igor Walukiewicz},
  title     = {Automata, Languages and Programming, 35th International Colloquium,
               {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
               {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
               Track {C:} Security and Cryptography Foundations},
  series    = {Lecture Notes in Computer Science},
  volume    = {5126},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-70583-3},
  doi       = {10.1007/978-3-540-70583-3},
  isbn      = {978-3-540-70582-6},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/2008-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cisc/2008,
  editor    = {Dingyi Pei and
               Moti Yung and
               Dongdai Lin and
               Chuankun Wu},
  title     = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
               2007, Xining, China, August 31 - September 5, 2007, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4990},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-79499-8},
  doi       = {10.1007/978-3-540-79499-8},
  isbn      = {978-3-540-79498-1},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cisc/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2007,
  editor    = {Alfred Menezes},
  title     = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4622},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5},
  doi       = {10.1007/978-3-540-74143-5},
  isbn      = {978-3-540-74142-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2007,
  editor    = {Tatsuaki Okamoto and
               Xiaoyun Wang},
  title     = {Public Key Cryptography - {PKC} 2007, 10th International Conference
               on Practice and Theory in Public-Key Cryptography, Beijing, China,
               April 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4450},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-71677-8},
  doi       = {10.1007/978-3-540-71677-8},
  isbn      = {978-3-540-71676-1},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/birthday/2006even,
  editor    = {Oded Goldreich and
               Arnold L. Rosenberg and
               Alan L. Selman},
  title     = {Theoretical Computer Science, Essays in Memory of Shimon Even},
  series    = {Lecture Notes in Computer Science},
  volume    = {3895},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11685654},
  doi       = {10.1007/11685654},
  isbn      = {3-540-32880-7},
  timestamp = {Wed, 15 Nov 2017 19:50:09 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/birthday/2006even},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2006,
  editor    = {Cynthia Dwork},
  title     = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4117},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11818175},
  doi       = {10.1007/11818175},
  isbn      = {3-540-37432-9},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2006,
  editor    = {David Pointcheval},
  title     = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
               the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3860},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11605805},
  doi       = {10.1007/11605805},
  isbn      = {3-540-31033-9},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2006,
  editor    = {Matthew J. B. Robshaw},
  title     = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
               Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4047},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11799313},
  doi       = {10.1007/11799313},
  isbn      = {3-540-36597-4},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2005,
  editor    = {Josyula R. Rao and
               Berk Sunar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
               Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3659},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11545262},
  doi       = {10.1007/11545262},
  isbn      = {3-540-28474-5},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2005,
  editor    = {Henri Gilbert and
               Helena Handschuh},
  title     = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
               Paris, France, February 21-23, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3557},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137506},
  doi       = {10.1007/b137506},
  isbn      = {3-540-26541-4},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2005,
  editor    = {Henk C. A. van Tilborg},
  title     = {Encyclopedia of Cryptography and Security},
  publisher = {Springer},
  year      = {2005},
  isbn      = {978-0-387-23473-1},
  timestamp = {Fri, 25 Nov 2011 17:44:27 +0100},
  biburl    = {http://dblp.org/rec/bib/reference/crypt/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2004,
  editor    = {Pil Joong Lee},
  title     = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3329},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b104116},
  doi       = {10.1007/b104116},
  isbn      = {3-540-23975-8},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2004,
  editor    = {Marc Joye and
               Jean{-}Jacques Quisquater},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
               Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3156},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b99451},
  doi       = {10.1007/b99451},
  isbn      = {3-540-22666-4},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2004,
  editor    = {Bimal K. Roy and
               Willi Meier},
  title     = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
               Delhi, India, February 5-7, 2004, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3017},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98177},
  doi       = {10.1007/b98177},
  isbn      = {3-540-22171-9},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2003,
  editor    = {Chi{-}Sung Laih},
  title     = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2894},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b94617},
  doi       = {10.1007/b94617},
  isbn      = {3-540-20592-6},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2003,
  editor    = {Dan Boneh},
  title     = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2729},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b11817},
  doi       = {10.1007/b11817},
  isbn      = {3-540-40674-3},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2003,
  editor    = {Marc Joye},
  title     = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
               the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2612},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36563-X},
  doi       = {10.1007/3-540-36563-X},
  isbn      = {3-540-00847-0},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2003,
  editor    = {Mitsuru Matsui and
               Robert J. Zuccherato},
  title     = {Selected Areas in Cryptography, 10th Annual International Workshop,
               {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3006},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b96837},
  doi       = {10.1007/b96837},
  isbn      = {3-540-21370-8},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2002,
  editor    = {Yuliang Zheng},
  title     = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2501},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36178-2},
  doi       = {10.1007/3-540-36178-2},
  isbn      = {3-540-00171-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2002,
  editor    = {Burton S. Kaliski Jr. and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
               Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2523},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36400-5},
  doi       = {10.1007/3-540-36400-5},
  isbn      = {3-540-00409-2},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2002,
  editor    = {Moti Yung},
  title     = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2442},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45708-9},
  doi       = {10.1007/3-540-45708-9},
  isbn      = {3-540-44050-X},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2001,
  editor    = {Colin Boyd},
  title     = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2248},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45682-1},
  doi       = {10.1007/3-540-45682-1},
  isbn      = {3-540-42987-5},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2001,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               David Naccache and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
               Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2162},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44709-1},
  doi       = {10.1007/3-540-44709-1},
  isbn      = {3-540-42521-7},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2001,
  editor    = {Joe Kilian},
  title     = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2139},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44647-8},
  doi       = {10.1007/3-540-44647-8},
  isbn      = {3-540-42456-3},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2001,
  editor    = {Birgit Pfitzmann},
  title     = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
               on the Theory and Application of Cryptographic Techniques, Innsbruck,
               Austria, May 6-10, 2001, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {2045},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44987-6},
  doi       = {10.1007/3-540-44987-6},
  isbn      = {3-540-42070-3},
  timestamp = {Fri, 26 May 2017 14:09:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2001,
  editor    = {Paul F. Syverson},
  title     = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
               Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2339},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-46088-8},
  doi       = {10.1007/3-540-46088-8},
  isbn      = {3-540-44079-8},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2001,
  editor    = {Mitsuru Matsui},
  title     = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
               Japan, April 2-4, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2355},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45473-X},
  doi       = {10.1007/3-540-45473-X},
  isbn      = {3-540-43869-6},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2001,
  editor    = {Serge Vaudenay and
               Amr M. Youssef},
  title     = {Selected Areas in Cryptography, 8th Annual International Workshop,
               {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2259},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45537-X},
  doi       = {10.1007/3-540-45537-X},
  isbn      = {3-540-43066-0},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2000,
  editor    = {Tatsuaki Okamoto},
  title     = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1976},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44448-3},
  doi       = {10.1007/3-540-44448-3},
  isbn      = {3-540-41404-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2000,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
               International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1965},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44499-8},
  doi       = {10.1007/3-540-44499-8},
  isbn      = {3-540-41455-X},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2000,
  editor    = {Bart Preneel},
  title     = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1807},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-45539-6},
  doi       = {10.1007/3-540-45539-6},
  isbn      = {3-540-67517-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2000,
  editor    = {Bruce Schneier},
  title     = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
               New York, NY, USA, April 10-12, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1978},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44706-7},
  doi       = {10.1007/3-540-44706-7},
  isbn      = {3-540-41728-1},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/1999,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems, First International Workshop,
               CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1717},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48059-5},
  doi       = {10.1007/3-540-48059-5},
  isbn      = {3-540-66646-X},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1999,
  editor    = {Michael J. Wiener},
  title     = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1666},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48405-1},
  doi       = {10.1007/3-540-48405-1},
  isbn      = {3-540-66347-9},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/99,
  editor    = {Jacques Stern},
  title     = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1592},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48910-X},
  doi       = {10.1007/3-540-48910-X},
  isbn      = {3-540-65889-0},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/1999,
  editor    = {Matthew K. Franklin},
  title     = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1648},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48390-X},
  doi       = {10.1007/3-540-48390-X},
  isbn      = {3-540-66362-2},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/1999,
  editor    = {Lars R. Knudsen},
  title     = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
               Italy, March 24-26, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1636},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48519-8},
  doi       = {10.1007/3-540-48519-8},
  isbn      = {3-540-66226-X},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/1999,
  editor    = {Hideki Imai and
               Yuliang Zheng},
  title     = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1560},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-49162-7},
  doi       = {10.1007/3-540-49162-7},
  isbn      = {3-540-65644-8},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1998,
  editor    = {Hugo Krawczyk},
  title     = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1462},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0055715},
  doi       = {10.1007/BFb0055715},
  isbn      = {3-540-64892-5},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/98,
  editor    = {Kaisa Nyberg},
  title     = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
               on the Theory and Application of Cryptographic Techniques, Espoo,
               Finland, May 31 - June 4, 1998, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1403},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0054112},
  doi       = {10.1007/BFb0054112},
  isbn      = {3-540-64518-7},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ih/1998,
  editor    = {David Aucsmith},
  title     = {Information Hiding, Second International Workshop, Portland, Oregon,
               USA, April 14-17, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1525},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/3-540-49380-8},
  doi       = {10.1007/3-540-49380-8},
  isbn      = {3-540-65386-4},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ih/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/1998,
  editor    = {Stafford E. Tavares and
               Henk Meijer},
  title     = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
               August 17-18, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1556},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48892-8},
  doi       = {10.1007/3-540-48892-8},
  isbn      = {3-540-65894-7},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1997,
  editor    = {Burton S. Kaliski Jr.},
  title     = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1294},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0052223},
  doi       = {10.1007/BFb0052223},
  isbn      = {3-540-63384-7},
  timestamp = {Mon, 22 May 2017 17:11:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/97,
  editor    = {Walter Fumy},
  title     = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1233},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/3-540-69053-0},
  doi       = {10.1007/3-540-69053-0},
  isbn      = {3-540-62975-0},
  timestamp = {Mon, 22 May 2017 17:12:28 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/spw/1996,
  editor    = {T. Mark A. Lomas},
  title     = {Security Protocols, International Workshop, Cambridge, United Kingdom,
               April 10-12, 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1189},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/3-540-62494-5},
  doi       = {10.1007/3-540-62494-5},
  isbn      = {3-540-62494-5},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/spw/1996},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/94,
  editor    = {Alfredo De Santis},
  title     = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {950},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/BFb0053418},
  doi       = {10.1007/BFb0053418},
  isbn      = {3-540-60176-7},
  timestamp = {Sat, 20 May 2017 15:32:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/94},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1993,
  editor    = {Douglas R. Stinson},
  title     = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {773},
  publisher = {Springer},
  year      = {1994},
  url       = {https://doi.org/10.1007/3-540-48329-2},
  doi       = {10.1007/3-540-48329-2},
  isbn      = {3-540-57766-1},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1993},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/istcs/1993,
  title     = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993,
               Natanya, Israel, June 7-9, 1993, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1993},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=459},
  isbn      = {0-8186-3630-0},
  timestamp = {Tue, 31 May 2016 15:27:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/istcs/1993},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC25,
  editor    = {S. Rao Kosaraju and
               David S. Johnson and
               Alok Aggarwal},
  title     = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of
               Computing, May 16-18, 1993, San Diego, CA, {USA}},
  publisher = {{ACM}},
  year      = {1993},
  isbn      = {0-89791-591-7},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC25},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1992,
  editor    = {Ernest F. Brickell},
  title     = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {740},
  publisher = {Springer},
  year      = {1993},
  url       = {https://doi.org/10.1007/3-540-48071-4},
  doi       = {10.1007/3-540-48071-4},
  isbn      = {3-540-57340-2},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1992},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1991,
  editor    = {Joan Feigenbaum},
  title     = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {576},
  publisher = {Springer},
  year      = {1992},
  url       = {https://doi.org/10.1007/3-540-46766-1},
  doi       = {10.1007/3-540-46766-1},
  isbn      = {3-540-55188-3},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1991},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/91,
  editor    = {Donald W. Davies},
  title     = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
               Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
               1991, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {547},
  publisher = {Springer},
  year      = {1991},
  url       = {https://doi.org/10.1007/3-540-46416-6},
  doi       = {10.1007/3-540-46416-6},
  isbn      = {3-540-54620-0},
  timestamp = {Sat, 20 May 2017 15:32:55 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/FOCS32,
  title     = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
               Puerto Rico, 1-4 October 1991},
  publisher = {{IEEE} Computer Society},
  year      = {1991},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=379},
  isbn      = {0-8186-2445-0},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FOCS32},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1990,
  editor    = {Alfred Menezes and
               Scott A. Vanstone},
  title     = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {537},
  publisher = {Springer},
  year      = {1991},
  url       = {https://doi.org/10.1007/3-540-38424-3},
  doi       = {10.1007/3-540-38424-3},
  isbn      = {3-540-54508-5},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1990},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/FOCS31a,
  title     = {31st Annual Symposium on Foundations of Computer Science, St. Louis,
               Missouri, USA, October 22-24, 1990, Volume {I}},
  publisher = {{IEEE} Computer Society},
  year      = {1990},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=310},
  isbn      = {0-8186-2082-X},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FOCS31a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC22,
  editor    = {Harriet Ortiz},
  title     = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing,
               May 13-17, 1990, Baltimore, Maryland, {USA}},
  publisher = {{ACM}},
  year      = {1990},
  isbn      = {0-89791-361-2},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC22},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1989,
  title     = {Proceedings: Fourth Annual Structure in Complexity Theory Conference,
               University of Oregon, Eugene, Oregon, USA, June 19-22, 1989},
  publisher = {{IEEE} Computer Society},
  year      = {1989},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=250},
  isbn      = {0-8186-1958-9},
  timestamp = {Fri, 13 May 2016 10:39:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/coco/1989},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1989,
  editor    = {Gilles Brassard},
  title     = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {435},
  publisher = {Springer},
  year      = {1990},
  url       = {https://doi.org/10.1007/0-387-34805-0},
  doi       = {10.1007/0-387-34805-0},
  isbn      = {3-540-97317-6},
  timestamp = {Fri, 19 May 2017 13:10:48 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1989},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs2,
  editor    = {Joan Feigenbaum and
               Michael Merritt},
  title     = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series    = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume    = {2},
  publisher = {{DIMACS/AMS}},
  year      = {1991},
  url       = {http://dimacs.rutgers.edu/Volumes/Vol02.html},
  timestamp = {Wed, 13 Jan 2016 17:47:42 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/dimacs/dimacs2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/FOCS30,
  title     = {30th Annual Symposium on Foundations of Computer Science, Research
               Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  publisher = {{IEEE} Computer Society},
  year      = {1989},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=260},
  isbn      = {0-8186-1982-1},
  timestamp = {Mon, 15 Dec 2014 18:48:45 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FOCS30},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/1989,
  editor    = {Giorgio Ausiello and
               Mariangiola Dezani{-}Ciancaglini and
               Simona Ronchi Della Rocca},
  title     = {Automata, Languages and Programming, 16th International Colloquium,
               ICALP89, Stresa, Italy, July 11-15, 1989, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {372},
  publisher = {Springer},
  year      = {1989},
  url       = {https://doi.org/10.1007/BFb0035746},
  doi       = {10.1007/BFb0035746},
  isbn      = {3-540-51371-X},
  timestamp = {Thu, 15 Jun 2017 21:39:15 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/1989},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1988,
  editor    = {Shafi Goldwasser},
  title     = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {403},
  publisher = {Springer},
  year      = {1990},
  url       = {https://doi.org/10.1007/0-387-34799-2},
  doi       = {10.1007/0-387-34799-2},
  isbn      = {3-540-97196-3},
  timestamp = {Fri, 19 May 2017 13:10:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1988},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1987,
  editor    = {Carl Pomerance},
  title     = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
               and Applications of Cryptographic Techniques, Santa Barbara, California,
               USA, August 16-20, 1987, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {293},
  publisher = {Springer},
  year      = {1988},
  url       = {https://doi.org/10.1007/3-540-48184-2},
  doi       = {10.1007/3-540-48184-2},
  isbn      = {3-540-18796-0},
  timestamp = {Fri, 19 May 2017 13:10:47 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1987},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC19,
  editor    = {Alfred V. Aho},
  title     = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing,
               1987, New York, New York, {USA}},
  publisher = {{ACM}},
  year      = {1987},
  isbn      = {0-89791-221-7},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC19},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1986,
  editor    = {Andrew M. Odlyzko},
  title     = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
               USA, 1986, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {263},
  publisher = {Springer},
  year      = {1987},
  url       = {https://doi.org/10.1007/3-540-47721-7},
  doi       = {10.1007/3-540-47721-7},
  timestamp = {Fri, 19 May 2017 13:10:48 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1986},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icpp/1986,
  title     = {International Conference on Parallel Processing, ICPP'86, University
               Park, PA, USA, August 1986},
  publisher = {{IEEE} Computer Society Press},
  year      = {1986},
  timestamp = {Mon, 28 Jul 2014 17:06:02 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icpp/1986},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC18,
  editor    = {Juris Hartmanis},
  title     = {Proceedings of the 18th Annual {ACM} Symposium on Theory of Computing,
               May 28-30, 1986, Berkeley, California, {USA}},
  publisher = {{ACM}},
  year      = {1986},
  isbn      = {0-89791-193-8},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC18},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1985,
  editor    = {Hugh C. Williams},
  title     = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
               USA, August 18-22, 1985, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {218},
  publisher = {Springer},
  year      = {1986},
  url       = {https://doi.org/10.1007/3-540-39799-X},
  doi       = {10.1007/3-540-39799-X},
  isbn      = {3-540-16463-4},
  timestamp = {Fri, 19 May 2017 12:26:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1985},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/85,
  editor    = {Franz Pichler},
  title     = {Advances in Cryptology - {EUROCRYPT} '85, Workshop on the Theory and
               Application of of Cryptographic Techniques, Linz, Austria, April 1985,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {219},
  publisher = {Springer},
  year      = {1986},
  url       = {https://doi.org/10.1007/3-540-39805-8},
  doi       = {10.1007/3-540-39805-8},
  isbn      = {3-540-16468-5},
  timestamp = {Fri, 19 May 2017 12:26:24 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icpp/1985,
  title     = {International Conference on Parallel Processing, ICPP'85, University
               Park, PA, USA, August 1985},
  publisher = {{IEEE} Computer Society Press},
  year      = {1985},
  timestamp = {Mon, 28 Jul 2014 17:06:01 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icpp/1985},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC17,
  editor    = {Robert Sedgewick},
  title     = {Proceedings of the 17th Annual {ACM} Symposium on Theory of Computing,
               May 6-8, 1985, Providence, Rhode Island, {USA}},
  publisher = {{ACM}},
  year      = {1985},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1984,
  editor    = {G. R. Blakley and
               David Chaum},
  title     = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
               California, USA, August 19-22, 1984, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {196},
  publisher = {Springer},
  year      = {1985},
  url       = {https://doi.org/10.1007/3-540-39568-7},
  doi       = {10.1007/3-540-39568-7},
  isbn      = {3-540-15658-5},
  timestamp = {Fri, 19 May 2017 12:26:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1984},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/FOCS25,
  title     = {25th Annual Symposium on Foundations of Computer Science, West Palm
               Beach, Florida, USA, 24-26 October 1984},
  publisher = {{IEEE} Computer Society},
  year      = {1984},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5813},
  isbn      = {0-8186-0591-X},
  timestamp = {Mon, 15 Dec 2014 18:48:45 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FOCS25},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC16,
  editor    = {Richard A. DeMillo},
  title     = {Proceedings of the 16th Annual {ACM} Symposium on Theory of Computing,
               April 30 - May 2, 1984, Washington, DC, {USA}},
  publisher = {{ACM}},
  year      = {1984},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC15,
  editor    = {David S. Johnson and
               Ronald Fagin and
               Michael L. Fredman and
               David Harel and
               Richard M. Karp and
               Nancy A. Lynch and
               Christos H. Papadimitriou and
               Ronald L. Rivest and
               Walter L. Ruzzo and
               Joel I. Seiferas},
  title     = {Proceedings of the 15th Annual {ACM} Symposium on Theory of Computing,
               25-27 April, 1983, Boston, Massachusetts, {USA}},
  publisher = {{ACM}},
  year      = {1983},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1982,
  editor    = {David Chaum and
               Ronald L. Rivest and
               Alan T. Sherman},
  title     = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara,
               California, USA, August 23-25, 1982},
  publisher = {Plenum Press, New York},
  year      = {1983},
  timestamp = {Tue, 13 Dec 2011 17:24:50 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1982},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/FOCS23,
  title     = {23rd Annual Symposium on Foundations of Computer Science, Chicago,
               Illinois, USA, 3-5 November 1982},
  publisher = {{IEEE} Computer Society},
  year      = {1982},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4568363},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FOCS23},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC14,
  editor    = {Harry R. Lewis and
               Barbara B. Simons and
               Walter A. Burkhard and
               Lawrence H. Landweber},
  title     = {Proceedings of the 14th Annual {ACM} Symposium on Theory of Computing,
               May 5-7, 1982, San Francisco, California, {USA}},
  publisher = {{ACM}},
  year      = {1982},
  url       = {http://doi.acm.org/10.1145/800070},
  doi       = {10.1145/800070},
  isbn      = {0-89791-067-2},
  timestamp = {Sun, 21 May 2017 00:22:29 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1981,
  editor    = {Allen Gersho},
  title     = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE}
               Workshop on Communications Security, Santa Barbara, California, USA,
               August 24-26, 1981},
  publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report
               No 82-04},
  year      = {1982},
  timestamp = {Tue, 13 Dec 2011 17:24:50 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/1981},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/1981,
  editor    = {Shimon Even and
               Oded Kariv},
  title     = {Automata, Languages and Programming, 8th Colloquium, Acre (Akko),
               Israel, July 13-17, 1981, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {115},
  publisher = {Springer},
  year      = {1981},
  url       = {https://doi.org/10.1007/3-540-10843-2},
  doi       = {10.1007/3-540-10843-2},
  isbn      = {3-540-10843-2},
  timestamp = {Fri, 19 May 2017 12:26:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/1981},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/1980,
  editor    = {J. W. de Bakker and
               Jan van Leeuwen},
  title     = {Automata, Languages and Programming, 7th Colloquium, Noordweijkerhout,
               The Netherland, July 14-18, 1980, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {85},
  publisher = {Springer},
  year      = {1980},
  url       = {https://doi.org/10.1007/3-540-10003-2},
  doi       = {10.1007/3-540-10003-2},
  isbn      = {3-540-10003-2},
  timestamp = {Fri, 19 May 2017 12:26:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/1980},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/1980,
  title     = {Proceedings of the 1980 {IEEE} Symposium on Security and Privacy,
               Oakland, California, USA, April 14-16, 1980},
  publisher = {{IEEE} Computer Society},
  year      = {1980},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6233684},
  isbn      = {0-8186-0335-6},
  timestamp = {Thu, 08 Jan 2015 16:59:41 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/sp/1980},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/FOCS20,
  title     = {20th Annual Symposium on Foundations of Computer Science, San Juan,
               Puerto Rico, 29-31 October 1979},
  publisher = {{IEEE} Computer Society},
  year      = {1979},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4567990},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FOCS20},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC11,
  editor    = {Michael J. Fischer and
               Richard A. DeMillo and
               Nancy A. Lynch and
               Walter A. Burkhard and
               Alfred V. Aho},
  title     = {Proceedings of the 11h Annual {ACM} Symposium on Theory of Computing,
               April 30 - May 2, 1979, Atlanta, Georgia, {USA}},
  publisher = {{ACM}},
  year      = {1979},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/1977,
  editor    = {Arto Salomaa and
               Magnus Steinby},
  title     = {Automata, Languages and Programming, Fourth Colloquium, University
               of Turku, Finland, July 18-22, 1977, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {52},
  publisher = {Springer},
  year      = {1977},
  url       = {https://doi.org/10.1007/3-540-08342-1},
  doi       = {10.1007/3-540-08342-1},
  isbn      = {3-540-08342-1},
  timestamp = {Fri, 19 May 2017 12:26:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icalp/1977},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/FOCS16,
  title     = {16th Annual Symposium on Foundations of Computer Science, Berkeley,
               California, USA, October 13-15, 1975},
  publisher = {{IEEE} Computer Society},
  year      = {1975},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4567844},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/FOCS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC7,
  editor    = {William C. Rounds and
               Nancy Martin and
               Jack W. Carlyle and
               Michael A. Harrison},
  title     = {Proceedings of the 7th Annual {ACM} Symposium on Theory of Computing,
               May 5-7, 1975, Albuquerque, New Mexico, {USA}},
  publisher = {{ACM}},
  year      = {1975},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/STOC7},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier