BibTeX records: Daniel Wichs

download as .bib file

@article{DBLP:journals/algorithmica/DodisSSW17,
  author    = {Yevgeniy Dodis and
               Adi Shamir and
               Noah Stephens{-}Davidowitz and
               Daniel Wichs},
  title     = {How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies
               for Compromised RNGs},
  journal   = {Algorithmica},
  volume    = {79},
  number    = {4},
  pages     = {1196--1232},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00453-016-0239-3},
  doi       = {10.1007/s00453-016-0239-3},
  timestamp = {Mon, 09 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/algorithmica/DodisSSW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/algorithmica/GargGHW17,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi and
               Daniel Wichs},
  title     = {On the Implausibility of Differing-Inputs Obfuscation and Extractable
               Witness Encryption with Auxiliary Input},
  journal   = {Algorithmica},
  volume    = {79},
  number    = {4},
  pages     = {1353--1373},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00453-017-0276-6},
  doi       = {10.1007/s00453-017-0276-6},
  timestamp = {Mon, 09 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/algorithmica/GargGHW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/CashKW17,
  author    = {David Cash and
               Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
               Daniel Wichs},
  title     = {Dynamic Proofs of Retrievability Via Oblivious {RAM}},
  journal   = {J. Cryptology},
  volume    = {30},
  number    = {1},
  pages     = {22--57},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00145-015-9216-2},
  doi       = {10.1007/s00145-015-9216-2},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/CashKW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JafargholiKKKPW17,
  author    = {Zahra Jafargholi and
               Chethan Kamath and
               Karen Klein and
               Ilan Komargodski and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Be Adaptive, Avoid Overcommitting},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {I}},
  pages     = {133--163},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-63688-7_5},
  doi       = {10.1007/978-3-319-63688-7_5},
  timestamp = {Mon, 14 Aug 2017 14:32:34 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/JafargholiKKKPW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/WichsZ17,
  author    = {Daniel Wichs and
               Giorgos Zirdelis},
  title     = {Obfuscating Compute-and-Compare Programs under {LWE}},
  booktitle = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
               2017, Berkeley, CA, USA, October 15-17, 2017},
  pages     = {600--611},
  year      = {2017},
  crossref  = {DBLP:conf/focs/2017},
  url       = {https://doi.org/10.1109/FOCS.2017.61},
  doi       = {10.1109/FOCS.2017.61},
  timestamp = {Thu, 16 Nov 2017 15:01:42 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/WichsZ17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JafargholiSW17,
  author    = {Zahra Jafargholi and
               Alessandra Scafuro and
               Daniel Wichs},
  title     = {Adaptively Indistinguishable Garbled Circuits},
  booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  pages     = {40--71},
  year      = {2017},
  crossref  = {DBLP:conf/tcc/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-70503-3_2},
  doi       = {10.1007/978-3-319-70503-3_2},
  timestamp = {Tue, 07 Nov 2017 12:38:48 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/JafargholiSW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserKW17,
  author    = {Shafi Goldwasser and
               Saleet Klein and
               Daniel Wichs},
  title     = {The Edited Truth},
  booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  pages     = {305--340},
  year      = {2017},
  crossref  = {DBLP:conf/tcc/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-70500-2_11},
  doi       = {10.1007/978-3-319-70500-2_11},
  timestamp = {Tue, 07 Nov 2017 12:31:11 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/GoldwasserKW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/WichsZ17,
  author    = {Daniel Wichs and
               Giorgos Zirdelis},
  title     = {Obfuscating Compute-and-Compare Programs under {LWE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {276},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/276},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/WichsZ17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/JafargholiKKKPW17,
  author    = {Zahra Jafargholi and
               Chethan Kamath and
               Karen Klein and
               Ilan Komargodski and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Be Adaptive, Avoid Overcommitting},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {515},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/515},
  timestamp = {Wed, 21 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/JafargholiKKKPW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKW17,
  author    = {Shafi Goldwasser and
               Saleet Klein and
               Daniel Wichs},
  title     = {The Edited Truth},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {714},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/714},
  timestamp = {Fri, 25 Aug 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GoldwasserKW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/KrennPWW16,
  author    = {Stephan Krenn and
               Krzysztof Pietrzak and
               Akshay Wadia and
               Daniel Wichs},
  title     = {A counterexample to the chain rule for conditional {HILL} entropy},
  journal   = {Computational Complexity},
  volume    = {25},
  number    = {3},
  pages     = {567--605},
  year      = {2016},
  url       = {https://doi.org/10.1007/s00037-015-0120-9},
  doi       = {10.1007/s00037-015-0120-9},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/cc/KrennPWW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/HazayLWW16,
  author    = {Carmit Hazay and
               Adriana L{\'{o}}pez{-}Alt and
               Hoeteck Wee and
               Daniel Wichs},
  title     = {Leakage-Resilient Cryptography from Minimal Assumptions},
  journal   = {J. Cryptology},
  volume    = {29},
  number    = {3},
  pages     = {514--551},
  year      = {2016},
  url       = {https://doi.org/10.1007/s00145-015-9200-x},
  doi       = {10.1007/s00145-015-9200-x},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/HazayLWW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/FaustMVW16,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi and
               Daniel Wichs},
  title     = {Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering
               Circuits},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {62},
  number    = {12},
  pages     = {7179--7194},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIT.2016.2613919},
  doi       = {10.1109/TIT.2016.2613919},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tit/FaustMVW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisHRW16,
  author    = {Yevgeniy Dodis and
               Shai Halevi and
               Ron D. Rothblum and
               Daniel Wichs},
  title     = {Spooky Encryption and Its Applications},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {III}},
  pages     = {93--122},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-3},
  url       = {https://doi.org/10.1007/978-3-662-53015-3_4},
  doi       = {10.1007/978-3-662-53015-3_4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DodisHRW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HemenwayJOSW16,
  author    = {Brett Hemenway and
               Zahra Jafargholi and
               Rafail Ostrovsky and
               Alessandra Scafuro and
               Daniel Wichs},
  title     = {Adaptively Secure Garbled Circuits from One-Way Functions},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {III}},
  pages     = {149--178},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-3},
  url       = {https://doi.org/10.1007/978-3-662-53015-3_6},
  doi       = {10.1007/978-3-662-53015-3_6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/HemenwayJOSW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BishopPRW16,
  author    = {Allison Bishop and
               Valerio Pastro and
               Rajmohan Rajaraman and
               Daniel Wichs},
  title     = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  pages     = {58--86},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-49890-3_3},
  doi       = {10.1007/978-3-662-49890-3_3},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/BishopPRW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NishimakiWZ16,
  author    = {Ryo Nishimaki and
               Daniel Wichs and
               Mark Zhandry},
  title     = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a
               Key},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  pages     = {388--419},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-49896-5_14},
  doi       = {10.1007/978-3-662-49896-5_14},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/NishimakiWZ16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MukherjeeW16,
  author    = {Pratyay Mukherjee and
               Daniel Wichs},
  title     = {Two Round Multiparty Computation via Multi-key {FHE}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  pages     = {735--763},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-49896-5_26},
  doi       = {10.1007/978-3-662-49896-5_26},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/MukherjeeW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BrakerskiVWW16,
  author    = {Zvika Brakerski and
               Vinod Vaikuntanathan and
               Hoeteck Wee and
               Daniel Wichs},
  title     = {Obfuscating Conjunctions under Entropic Ring {LWE}},
  booktitle = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
               Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  pages     = {147--156},
  year      = {2016},
  crossref  = {DBLP:conf/innovations/2016},
  url       = {http://doi.acm.org/10.1145/2840728.2840764},
  doi       = {10.1145/2840728.2840764},
  timestamp = {Mon, 18 Jan 2016 19:44:01 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/BrakerskiVWW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CohenHNVW16,
  author    = {Aloni Cohen and
               Justin Holmgren and
               Ryo Nishimaki and
               Vinod Vaikuntanathan and
               Daniel Wichs},
  title     = {Watermarking cryptographic capabilities},
  booktitle = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
               of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  pages     = {1115--1127},
  year      = {2016},
  crossref  = {DBLP:conf/stoc/2016},
  url       = {http://doi.acm.org/10.1145/2897518.2897651},
  doi       = {10.1145/2897518.2897651},
  timestamp = {Fri, 10 Jun 2016 10:30:30 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/CohenHNVW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HofheinzRW16,
  author    = {Dennis Hofheinz and
               Vanishree Rao and
               Daniel Wichs},
  title     = {Standard Security Does Not Imply Indistinguishability Under Selective
               Opening},
  booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  pages     = {121--145},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016b2},
  url       = {https://doi.org/10.1007/978-3-662-53644-5_5},
  doi       = {10.1007/978-3-662-53644-5_5},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/HofheinzRW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DevadasDFRSW16,
  author    = {Srinivas Devadas and
               Marten van Dijk and
               Christopher W. Fletcher and
               Ling Ren and
               Elaine Shi and
               Daniel Wichs},
  title     = {Onion {ORAM:} {A} Constant Bandwidth Blowup Oblivious {RAM}},
  booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  pages     = {145--174},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016a2},
  url       = {https://doi.org/10.1007/978-3-662-49099-0_6},
  doi       = {10.1007/978-3-662-49099-0_6},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/DevadasDFRSW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyNPW16,
  author    = {Nir Bitansky and
               Ryo Nishimaki and
               Alain Passel{\`{e}}gue and
               Daniel Wichs},
  title     = {From Cryptomania to Obfustopia Through Secret-Key Functional Encryption},
  booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  pages     = {391--418},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016b2},
  url       = {https://doi.org/10.1007/978-3-662-53644-5_15},
  doi       = {10.1007/978-3-662-53644-5_15},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/BitanskyNPW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JafargholiW16,
  author    = {Zahra Jafargholi and
               Daniel Wichs},
  title     = {Adaptive Security of Yao's Garbled Circuits},
  booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  pages     = {433--458},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016b1},
  url       = {https://doi.org/10.1007/978-3-662-53641-4_17},
  doi       = {10.1007/978-3-662-53641-4_17},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/JafargholiW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyPW16,
  author    = {Nir Bitansky and
               Omer Paneth and
               Daniel Wichs},
  title     = {Perfect Structure on the Edge of Chaos - Trapdoor Permutations from
               Indistinguishability Obfuscation},
  booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  pages     = {474--502},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016a1},
  url       = {https://doi.org/10.1007/978-3-662-49096-9_20},
  doi       = {10.1007/978-3-662-49096-9_20},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/BitanskyPW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2016,
  editor    = {Daniel Wichs and
               Yishay Mansour},
  title     = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
               of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2897518},
  isbn      = {978-1-4503-4132-5},
  timestamp = {Fri, 10 Jun 2016 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisHRW16,
  author    = {Yevgeniy Dodis and
               Shai Halevi and
               Ron D. Rothblum and
               Daniel Wichs},
  title     = {Spooky Encryption and its Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {272},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/272},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisHRW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyNPW16,
  author    = {Nir Bitansky and
               Ryo Nishimaki and
               Alain Passel{\`{e}}gue and
               Daniel Wichs},
  title     = {From Cryptomania to Obfustopia through Secret-Key Functional Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {558},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/558},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BitanskyNPW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/JafargholiW16,
  author    = {Zahra Jafargholi and
               Daniel Wichs},
  title     = {Adaptive Security of Yao's Garbled Circuits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {814},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/814},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/JafargholiW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkamotoPWW15,
  author    = {Tatsuaki Okamoto and
               Krzysztof Pietrzak and
               Brent Waters and
               Daniel Wichs},
  title     = {New Realizations of Somewhere Statistically Binding Hashing and Positional
               Accumulators},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  pages     = {121--145},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-48797-6_6},
  doi       = {10.1007/978-3-662-48797-6_6},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/OkamotoPWW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/HubacekW15,
  author    = {Pavel Hub{\'{a}}cek and
               Daniel Wichs},
  title     = {On the Communication Complexity of Secure Function Evaluation with
               Long Output},
  booktitle = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
               Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages     = {163--172},
  year      = {2015},
  crossref  = {DBLP:conf/innovations/2015},
  url       = {http://doi.acm.org/10.1145/2688073.2688105},
  doi       = {10.1145/2688073.2688105},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/HubacekW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LyubashevskyW15,
  author    = {Vadim Lyubashevsky and
               Daniel Wichs},
  title     = {Simple Lattice Trapdoor Sampling from a Broad Class of Distributions},
  booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  pages     = {716--730},
  year      = {2015},
  crossref  = {DBLP:conf/pkc/2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2_32},
  doi       = {10.1007/978-3-662-46447-2_32},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/LyubashevskyW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GorbunovVW15,
  author    = {Sergey Gorbunov and
               Vinod Vaikuntanathan and
               Daniel Wichs},
  title     = {Leveled Fully Homomorphic Signatures from Standard Lattices},
  booktitle = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory
               of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015},
  pages     = {469--477},
  year      = {2015},
  crossref  = {DBLP:conf/stoc/2015},
  url       = {http://doi.acm.org/10.1145/2746539.2746576},
  doi       = {10.1145/2746539.2746576},
  timestamp = {Wed, 10 Jun 2015 17:10:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/GorbunovVW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JafargholiW15,
  author    = {Zahra Jafargholi and
               Daniel Wichs},
  title     = {Tamper Detection and Continuous Non-malleable Codes},
  booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  pages     = {451--480},
  year      = {2015},
  crossref  = {DBLP:conf/tcc/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-46494-6_19},
  doi       = {10.1007/978-3-662-46494-6_19},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/JafargholiW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyPW15,
  author    = {Nir Bitansky and
               Omer Paneth and
               Daniel Wichs},
  title     = {Perfect Structure on the Edge of Chaos},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {126},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/126},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BitanskyPW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiW15,
  author    = {Ryo Nishimaki and
               Daniel Wichs},
  title     = {Watermarking Cryptographic Programs Against Arbitrary Removal Strategies},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {344},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/344},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/NishimakiW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MukherjeeW15,
  author    = {Pratyay Mukherjee and
               Daniel Wichs},
  title     = {Two Round {MPC} from {LWE} via Multi-Key {FHE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {345},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/345},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/MukherjeeW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiWZ15,
  author    = {Ryo Nishimaki and
               Daniel Wichs and
               Mark Zhandry},
  title     = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a
               Key},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {750},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/750},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/NishimakiWZ15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzRW15,
  author    = {Dennis Hofheinz and
               Vanishree Rao and
               Daniel Wichs},
  title     = {Standard Security Does Not Imply Indistinguishability Under Selective
               Opening},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {792},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/792},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/HofheinzRW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoPWW15,
  author    = {Tatsuaki Okamoto and
               Krzysztof Pietrzak and
               Brent Waters and
               Daniel Wichs},
  title     = {New Realizations of Somewhere Statistically Binding Hashing and Positional
               Accumulators},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {869},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/869},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/OkamotoPWW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BishopPRW15,
  author    = {Allison Bishop and
               Valerio Pastro and
               Rajmohan Rajaraman and
               Daniel Wichs},
  title     = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1032},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1032},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BishopPRW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CohenHNVW15,
  author    = {Aloni Cohen and
               Justin Holmgren and
               Ryo Nishimaki and
               Vinod Vaikuntanathan and
               Daniel Wichs},
  title     = {Watermarking Cryptographic Capabilities},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1096},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1096},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CohenHNVW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayJOSW15,
  author    = {Brett Hemenway and
               Zahra Jafargholi and
               Rafail Ostrovsky and
               Alessandra Scafuro and
               Daniel Wichs},
  title     = {Adaptively Secure Garbled Circuits from One-Way Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1250},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1250},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/HemenwayJOSW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisSSW14,
  author    = {Yevgeniy Dodis and
               Adi Shamir and
               Noah Stephens{-}Davidowitz and
               Daniel Wichs},
  title     = {How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies
               for Compromised RNGs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  pages     = {37--54},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-2},
  url       = {https://doi.org/10.1007/978-3-662-44381-1_3},
  doi       = {10.1007/978-3-662-44381-1_3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DodisSSW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargGHW14,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi and
               Daniel Wichs},
  title     = {On the Implausibility of Differing-Inputs Obfuscation and Extractable
               Witness Encryption with Auxiliary Input},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {518--535},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2_29},
  doi       = {10.1007/978-3-662-44371-2_29},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/GargGHW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisPW14,
  author    = {Yevgeniy Dodis and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Key Derivation without Entropy Waste},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  pages     = {93--110},
  year      = {2014},
  crossref  = {DBLP:conf/eurocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5_6},
  doi       = {10.1007/978-3-642-55220-5_6},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/DodisPW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaustMVW14,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi and
               Daniel Wichs},
  title     = {Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering
               Circuits},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  pages     = {111--128},
  year      = {2014},
  crossref  = {DBLP:conf/eurocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5_7},
  doi       = {10.1007/978-3-642-55220-5_7},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/FaustMVW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryHLO0W14,
  author    = {Craig Gentry and
               Shai Halevi and
               Steve Lu and
               Rafail Ostrovsky and
               Mariana Raykova and
               Daniel Wichs},
  title     = {Garbled {RAM} Revisited},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  pages     = {405--422},
  year      = {2014},
  crossref  = {DBLP:conf/eurocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5_23},
  doi       = {10.1007/978-3-642-55220-5_23},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/GentryHLO0W14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/GentryH0W14,
  author    = {Craig Gentry and
               Shai Halevi and
               Mariana Raykova and
               Daniel Wichs},
  title     = {Outsourcing Private {RAM} Computation},
  booktitle = {55th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
               2014, Philadelphia, PA, USA, October 18-21, 2014},
  pages     = {404--413},
  year      = {2014},
  crossref  = {DBLP:conf/focs/2014},
  url       = {https://doi.org/10.1109/FOCS.2014.50},
  doi       = {10.1109/FOCS.2014.50},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/GentryH0W14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GentryH0W14,
  author    = {Craig Gentry and
               Shai Halevi and
               Mariana Raykova and
               Daniel Wichs},
  title     = {Garbled {RAM} Revisited, Part {I}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {82},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/082},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GentryH0W14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GentryH0W14a,
  author    = {Craig Gentry and
               Shai Halevi and
               Mariana Raykova and
               Daniel Wichs},
  title     = {Outsourcing Private {RAM} Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {148},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/148},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GentryH0W14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisSSW14,
  author    = {Yevgeniy Dodis and
               Adi Shamir and
               Noah Stephens{-}Davidowitz and
               Daniel Wichs},
  title     = {How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies
               for Compromised RNGs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {167},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/167},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisSSW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Wichs14,
  author    = {Daniel Wichs},
  title     = {Leveled Fully Homomorphic Signatures from Standard Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {451},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/451},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/Wichs14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/HubacekW14a,
  author    = {Pavel Hub{\'{a}}cek and
               Daniel Wichs},
  title     = {On the Communication Complexity of Secure Function Evaluation with
               Long Output},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {669},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/669},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/HubacekW14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/KrennPWW14a,
  author    = {Stephan Krenn and
               Krzysztof Pietrzak and
               Akshay Wadia and
               Daniel Wichs},
  title     = {A Counterexample to the Chain Rule for Conditional {HILL} Entropy},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {678},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/678},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/KrennPWW14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GorbunovVW14,
  author    = {Sergey Gorbunov and
               Vinod Vaikuntanathan and
               Daniel Wichs},
  title     = {Leveled Fully Homomorphic Signatures from Standard Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {897},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/897},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GorbunovVW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/JafargholiW14,
  author    = {Zahra Jafargholi and
               Daniel Wichs},
  title     = {Tamper Detection and Continuous Non-Malleable Codes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {956},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/956},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/JafargholiW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/LyubashevskyW14,
  author    = {Vadim Lyubashevsky and
               Daniel Wichs},
  title     = {Simple Lattice Trapdoor Sampling from a Broad Class of Distributions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {1027},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/1027},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/LyubashevskyW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BoyleSW13,
  author    = {Elette Boyle and
               Gil Segev and
               Daniel Wichs},
  title     = {Fully Leakage-Resilient Signatures},
  journal   = {J. Cryptology},
  volume    = {26},
  number    = {3},
  pages     = {513--558},
  year      = {2013},
  url       = {https://doi.org/10.1007/s00145-012-9136-3},
  doi       = {10.1007/s00145-012-9136-3},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/joc/BoyleSW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GennaroW13,
  author    = {Rosario Gennaro and
               Daniel Wichs},
  title     = {Fully Homomorphic Message Authenticators},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  pages     = {301--320},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-42045-0_16},
  doi       = {10.1007/978-3-642-42045-0_16},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/GennaroW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AgrawalDVW13,
  author    = {Shweta Agrawal and
               Yevgeniy Dodis and
               Vinod Vaikuntanathan and
               Daniel Wichs},
  title     = {On Continual Leakage of Discrete Log Representations},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  pages     = {401--420},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-42045-0_21},
  doi       = {10.1007/978-3-642-42045-0_21},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/AgrawalDVW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisPRVW13,
  author    = {Yevgeniy Dodis and
               David Pointcheval and
               Sylvain Ruhault and
               Damien Vergnaud and
               Daniel Wichs},
  title     = {Security analysis of pseudo-random number generators with input: /dev/random
               is not robust},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {647--658},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {http://doi.acm.org/10.1145/2508859.2516653},
  doi       = {10.1145/2508859.2516653},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/DodisPRVW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenKPW13,
  author    = {Jo{\"{e}}l Alwen and
               Stephan Krenn and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Learning with Rounding, Revisited - New Reduction, Properties and
               Applications},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {57--74},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4_4},
  doi       = {10.1007/978-3-642-40041-4_4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/AlwenKPW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HazayLWW13,
  author    = {Carmit Hazay and
               Adriana L{\'{o}}pez{-}Alt and
               Hoeteck Wee and
               Daniel Wichs},
  title     = {Leakage-Resilient Cryptography from Minimal Assumptions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  pages     = {160--176},
  year      = {2013},
  crossref  = {DBLP:conf/eurocrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9_10},
  doi       = {10.1007/978-3-642-38348-9_10},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/HazayLWW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CashKW13,
  author    = {David Cash and
               Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
               Daniel Wichs},
  title     = {Dynamic Proofs of Retrievability via Oblivious {RAM}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  pages     = {279--295},
  year      = {2013},
  crossref  = {DBLP:conf/eurocrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9_17},
  doi       = {10.1007/978-3-642-38348-9_17},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/CashKW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Wichs13,
  author    = {Daniel Wichs},
  title     = {Barriers in cryptography with weak, correlated and leaky sources},
  booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
               CA, USA, January 9-12, 2013},
  pages     = {111--126},
  year      = {2013},
  crossref  = {DBLP:conf/innovations/2013},
  url       = {http://doi.acm.org/10.1145/2422436.2422451},
  doi       = {10.1145/2422436.2422451},
  timestamp = {Sun, 17 Feb 2013 11:19:02 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/Wichs13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pet/GentryGHJ0W13,
  author    = {Craig Gentry and
               Kenny A. Goldman and
               Shai Halevi and
               Charanjit S. Jutla and
               Mariana Raykova and
               Daniel Wichs},
  title     = {Optimizing {ORAM} and Using It Efficiently for Secure Computation},
  booktitle = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
               2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  pages     = {1--18},
  year      = {2013},
  crossref  = {DBLP:conf/pet/2013},
  url       = {https://doi.org/10.1007/978-3-642-39077-7_1},
  doi       = {10.1007/978-3-642-39077-7_1},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pet/GentryGHJ0W13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyDG0KLW13,
  author    = {Nir Bitansky and
               Dana Dachman{-}Soled and
               Sanjam Garg and
               Abhishek Jain and
               Yael Tauman Kalai and
               Adriana L{\'{o}}pez{-}Alt and
               Daniel Wichs},
  title     = {Why "Fiat-Shamir for Proofs" Lacks a Proof},
  booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
               2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  pages     = {182--201},
  year      = {2013},
  crossref  = {DBLP:conf/tcc/2013},
  url       = {https://doi.org/10.1007/978-3-642-36594-2_11},
  doi       = {10.1007/978-3-642-36594-2_11},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/BitanskyDG0KLW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlwenKPW13,
  author    = {Jo{\"{e}}l Alwen and
               Stephan Krenn and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Learning with Rounding, Revisited: New Reduction, Properties and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {98},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/098},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlwenKPW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GentryGHJ0W13,
  author    = {Craig Gentry and
               Kenny A. Goldman and
               Shai Halevi and
               Charanjit S. Jutla and
               Mariana Raykova and
               Daniel Wichs},
  title     = {Optimizing {ORAM} and Using it Efficiently for Secure Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {239},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/239},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GentryGHJ0W13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisPRVW13,
  author    = {Yevgeniy Dodis and
               David Pointcheval and
               Sylvain Ruhault and
               Damien Vergnaud and
               Daniel Wichs},
  title     = {Security Analysis of Pseudo-Random Number Generators with Input: /dev/random
               is not Robust},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {338},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/338},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisPRVW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/FaustMVW13,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi and
               Daniel Wichs},
  title     = {Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering
               Circuits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {702},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/702},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/FaustMVW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisPW13,
  author    = {Yevgeniy Dodis and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Key Derivation Without Entropy Waste},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {708},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/708},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisPW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GargGHW13,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi and
               Daniel Wichs},
  title     = {On the Implausibility of Differing-Inputs Obfuscation and Extractable
               Witness Encryption with Auxiliary Input},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {860},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/860},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GargGHW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisKPW12,
  author    = {Yevgeniy Dodis and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Message Authentication, Revisited},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  pages     = {355--374},
  year      = {2012},
  crossref  = {DBLP:conf/eurocrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4_22},
  doi       = {10.1007/978-3-642-29011-4_22},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/DodisKPW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AsharovJLTVW12,
  author    = {Gilad Asharov and
               Abhishek Jain and
               Adriana L{\'{o}}pez{-}Alt and
               Eran Tromer and
               Vinod Vaikuntanathan and
               Daniel Wichs},
  title     = {Multiparty Computation with Low Communication, Computation and Interaction
               via Threshold {FHE}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  pages     = {483--501},
  year      = {2012},
  crossref  = {DBLP:conf/eurocrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4_29},
  doi       = {10.1007/978-3-642-29011-4_29},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/AsharovJLTVW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisJMW12,
  author    = {Yevgeniy Dodis and
               Abhishek Jain and
               Tal Moran and
               Daniel Wichs},
  title     = {Counterexamples to Hardness Amplification beyond Negligible},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {476--493},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9_27},
  doi       = {10.1007/978-3-642-28914-9_27},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/DodisJMW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisJMW12,
  author    = {Yevgeniy Dodis and
               Abhishek Jain and
               Tal Moran and
               Daniel Wichs},
  title     = {Counterexamples to Hardness Amplification Beyond Negligible},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {32},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/032},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisJMW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisKPW12,
  author    = {Yevgeniy Dodis and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Message Authentication, Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {59},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/059},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisKPW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GennaroW12,
  author    = {Rosario Gennaro and
               Daniel Wichs},
  title     = {Fully Homomorphic Message Authenticators},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {290},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/290},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GennaroW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalDVW12,
  author    = {Shweta Agrawal and
               Yevgeniy Dodis and
               Vinod Vaikuntanathan and
               Daniel Wichs},
  title     = {On Continual Leakage of Discrete Log Representations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {367},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/367},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AgrawalDVW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Wichs12,
  author    = {Daniel Wichs},
  title     = {Barriers in Cryptography with Weak, Correlated and Leaky Sources},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {459},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/459},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/Wichs12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CashKW12,
  author    = {David Cash and
               Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
               Daniel Wichs},
  title     = {Dynamic Proofs of Retrievability via Oblivious {RAM}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {550},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/550},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CashKW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/HazayLWW12,
  author    = {Carmit Hazay and
               Adriana L{\'{o}}pez{-}Alt and
               Hoeteck Wee and
               Daniel Wichs},
  title     = {Leakage-Resilient Cryptography from Minimal Assumptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {604},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/604},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/HazayLWW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyGW12,
  author    = {Nir Bitansky and
               Sanjam Garg and
               Daniel Wichs},
  title     = {Why "Fiat-Shamir for Proofs" Lacks a Proof},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {705},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/705},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BitanskyGW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiKW11,
  author    = {Stefan Dziembowski and
               Tomasz Kazana and
               Daniel Wichs},
  title     = {Key-Evolution Schemes Resilient to Space-Bounded Leakage},
  booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  pages     = {335--353},
  year      = {2011},
  crossref  = {DBLP:conf/crypto/2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9_19},
  doi       = {10.1007/978-3-642-22792-9_19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DziembowskiKW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyleSW11,
  author    = {Elette Boyle and
               Gil Segev and
               Daniel Wichs},
  title     = {Fully Leakage-Resilient Signatures},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tallinn, Estonia, May 15-19, 2011. Proceedings},
  pages     = {89--108},
  year      = {2011},
  crossref  = {DBLP:conf/eurocrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-20465-4_7},
  doi       = {10.1007/978-3-642-20465-4_7},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/BoyleSW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/DodisLWW11,
  author    = {Yevgeniy Dodis and
               Allison B. Lewko and
               Brent Waters and
               Daniel Wichs},
  title     = {Storing Secrets on Continually Leaky Devices},
  booktitle = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
               2011, Palm Springs, CA, USA, October 22-25, 2011},
  pages     = {688--697},
  year      = {2011},
  crossref  = {DBLP:conf/focs/2011},
  url       = {https://doi.org/10.1109/FOCS.2011.35},
  doi       = {10.1109/FOCS.2011.35},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/DodisLWW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GentryW11,
  author    = {Craig Gentry and
               Daniel Wichs},
  title     = {Separating succinct non-interactive arguments from all falsifiable
               assumptions},
  booktitle = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC}
               2011, San Jose, CA, USA, 6-8 June 2011},
  pages     = {99--108},
  year      = {2011},
  crossref  = {DBLP:conf/stoc/2011},
  url       = {http://doi.acm.org/10.1145/1993636.1993651},
  doi       = {10.1145/1993636.1993651},
  timestamp = {Tue, 22 May 2012 21:36:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/GentryW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DziembowskiKW11,
  author    = {Stefan Dziembowski and
               Tomasz Kazana and
               Daniel Wichs},
  title     = {One-Time Computable Self-erasing Functions},
  booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  pages     = {125--143},
  year      = {2011},
  crossref  = {DBLP:conf/tcc/2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6_9},
  doi       = {10.1007/978-3-642-19571-6_9},
  timestamp = {Tue, 13 Jun 2017 11:30:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/DziembowskiKW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisLWW11,
  author    = {Yevgeniy Dodis and
               Allison B. Lewko and
               Brent Waters and
               Daniel Wichs},
  title     = {Storing Secrets on Continually Leaky Devices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {369},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/369},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisLWW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiKW11,
  author    = {Stefan Dziembowski and
               Tomasz Kazana and
               Daniel Wichs},
  title     = {Key-Evolution Schemes Resilient to Space-Bounded Leakage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {530},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/530},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DziembowskiKW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AsharovJW11,
  author    = {Gilad Asharov and
               Abhishek Jain and
               Daniel Wichs},
  title     = {Multiparty Computation with Low Communication, Computation and Interaction
               via Threshold {FHE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {613},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/613},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AsharovJW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DodisHLW10,
  author    = {Yevgeniy Dodis and
               Kristiyan Haralambiev and
               Adriana L{\'{o}}pez{-}Alt and
               Daniel Wichs},
  title     = {Efficient Public-Key Cryptography in the Presence of Key Leakage},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  pages     = {613--631},
  year      = {2010},
  crossref  = {DBLP:conf/asiacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8_35},
  doi       = {10.1007/978-3-642-17373-8_35},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/DodisHLW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenDNSWW10,
  author    = {Jo{\"{e}}l Alwen and
               Yevgeniy Dodis and
               Moni Naor and
               Gil Segev and
               Shabsi Walfish and
               Daniel Wichs},
  title     = {Public-Key Encryption in the Bounded-Retrieval Model},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               French Riviera, May 30 - June 3, 2010. Proceedings},
  pages     = {113--134},
  year      = {2010},
  crossref  = {DBLP:conf/eurocrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5_6},
  doi       = {10.1007/978-3-642-13190-5_6},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/AlwenDNSWW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/DodisHLW10,
  author    = {Yevgeniy Dodis and
               Kristiyan Haralambiev and
               Adriana L{\'{o}}pez{-}Alt and
               Daniel Wichs},
  title     = {Cryptography against Continuous Memory Attacks},
  booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages     = {511--520},
  year      = {2010},
  crossref  = {DBLP:conf/focs/2010},
  url       = {https://doi.org/10.1109/FOCS.2010.56},
  doi       = {10.1109/FOCS.2010.56},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/DodisHLW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DziembowskiPW10,
  author    = {Stefan Dziembowski and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Non-Malleable Codes},
  booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 5-7, 2010. Proceedings},
  pages     = {434--452},
  year      = {2010},
  crossref  = {DBLP:conf/innovations/2010},
  url       = {http://conference.itcs.tsinghua.edu.cn/ICS2010/content/papers/34.html},
  timestamp = {Mon, 27 Sep 2010 12:57:50 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/DziembowskiPW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiKVW10,
  author    = {Ran Canetti and
               Yael Tauman Kalai and
               Mayank Varia and
               Daniel Wichs},
  title     = {On Symmetric Encryption and Point Obfuscation},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {52--71},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2_4},
  doi       = {10.1007/978-3-642-11799-2_4},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/CanettiKVW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKVW10,
  author    = {Ran Canetti and
               Yael Tauman Kalai and
               Mayank Varia and
               Daniel Wichs},
  title     = {On Symmetric Encryption and Point Obfuscation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {49},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/049},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CanettiKVW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisHLW10,
  author    = {Yevgeniy Dodis and
               Kristiyan Haralambiev and
               Adriana L{\'{o}}pez{-}Alt and
               Daniel Wichs},
  title     = {Efficient Public-Key Cryptography in the Presence of Key Leakage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {154},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/154},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisHLW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisHLW10a,
  author    = {Yevgeniy Dodis and
               Kristiyan Haralambiev and
               Adriana L{\'{o}}pez{-}Alt and
               Daniel Wichs},
  title     = {Cryptography Against Continuous Memory Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {196},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/196},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisHLW10a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BoyleSW10,
  author    = {Elette Boyle and
               Gil Segev and
               Daniel Wichs},
  title     = {Fully Leakage-Resilient Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {488},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/488},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BoyleSW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiKW10,
  author    = {Stefan Dziembowski and
               Tomasz Kazana and
               Daniel Wichs},
  title     = {One-time Computable and Uncomputable Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {541},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/541},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DziembowskiKW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GentryW10,
  author    = {Craig Gentry and
               Daniel Wichs},
  title     = {Separating Succinct Non-Interactive Arguments From All Falsifiable
               Assumptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {610},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/610},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GentryW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenDW09,
  author    = {Jo{\"{e}}l Alwen and
               Yevgeniy Dodis and
               Daniel Wichs},
  title     = {Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval
               Model},
  booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  pages     = {36--54},
  year      = {2009},
  crossref  = {DBLP:conf/crypto/2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8_3},
  doi       = {10.1007/978-3-642-03356-8_3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/AlwenDW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayWZ09,
  author    = {Juan A. Garay and
               Daniel Wichs and
               Hong{-}Sheng Zhou},
  title     = {Somewhat Non-committing Encryption and Efficient Adaptively Secure
               Oblivious Transfer},
  booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  pages     = {505--523},
  year      = {2009},
  crossref  = {DBLP:conf/crypto/2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8_30},
  doi       = {10.1007/978-3-642-03356-8_30},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/GarayWZ09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icits/AlwenDW09,
  author    = {Jo{\"{e}}l Alwen and
               Yevgeniy Dodis and
               Daniel Wichs},
  title     = {Survey: Leakage Resilience and the Bounded Retrieval Model},
  booktitle = {Information Theoretic Security, 4th International Conference, {ICITS}
               2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  pages     = {1--18},
  year      = {2009},
  crossref  = {DBLP:conf/icits/2009},
  url       = {https://doi.org/10.1007/978-3-642-14496-7_1},
  doi       = {10.1007/978-3-642-14496-7_1},
  timestamp = {Wed, 17 May 2017 10:54:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icits/AlwenDW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DodisW09,
  author    = {Yevgeniy Dodis and
               Daniel Wichs},
  title     = {Non-malleable extractors and symmetric key cryptography from weak
               secrets},
  booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
               {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages     = {601--610},
  year      = {2009},
  crossref  = {DBLP:conf/stoc/2009},
  url       = {http://doi.acm.org/10.1145/1536414.1536496},
  doi       = {10.1145/1536414.1536496},
  timestamp = {Fri, 05 Jun 2009 09:31:27 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/DodisW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisVW09,
  author    = {Yevgeniy Dodis and
               Salil P. Vadhan and
               Daniel Wichs},
  title     = {Proofs of Retrievability via Hardness Amplification},
  booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  pages     = {109--127},
  year      = {2009},
  crossref  = {DBLP:conf/tcc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00457-5_8},
  doi       = {10.1007/978-3-642-00457-5_8},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/DodisVW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardNW09,
  author    = {Ivan Damg{\aa}rd and
               Jesper Buus Nielsen and
               Daniel Wichs},
  title     = {Universally Composable Multiparty Computation with Partially Isolated
               Parties},
  booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  pages     = {315--331},
  year      = {2009},
  crossref  = {DBLP:conf/tcc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00457-5_19},
  doi       = {10.1007/978-3-642-00457-5_19},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/DamgardNW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisVW09,
  author    = {Yevgeniy Dodis and
               Salil P. Vadhan and
               Daniel Wichs},
  title     = {Proofs of Retrievability via Hardness Amplification},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {41},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/041},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisVW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlwenDW09,
  author    = {Jo{\"{e}}l Alwen and
               Yevgeniy Dodis and
               Daniel Wichs},
  title     = {Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval
               Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {160},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/160},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlwenDW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AlwenDNSWW09,
  author    = {Jo{\"{e}}l Alwen and
               Yevgeniy Dodis and
               Moni Naor and
               Gil Segev and
               Shabsi Walfish and
               Daniel Wichs},
  title     = {Public-Key Encryption in the Bounded-Retrieval Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {512},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/512},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/AlwenDNSWW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiPW09,
  author    = {Stefan Dziembowski and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Non-Malleable Codes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {608},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/608},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DziembowskiPW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDFPW08,
  author    = {Ronald Cramer and
               Yevgeniy Dodis and
               Serge Fehr and
               Carles Padr{\'{o}} and
               Daniel Wichs},
  title     = {Detection of Algebraic Manipulation with Applications to Robust Secret
               Sharing and Fuzzy Extractors},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Istanbul, Turkey, April 13-17, 2008. Proceedings},
  pages     = {471--488},
  year      = {2008},
  crossref  = {DBLP:conf/eurocrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-78967-3_27},
  doi       = {10.1007/978-3-540-78967-3_27},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/CramerDFPW08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardNW08,
  author    = {Ivan Damg{\aa}rd and
               Jesper Buus Nielsen and
               Daniel Wichs},
  title     = {Isolated Proofs of Knowledge and Isolated Zero Knowledge},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Istanbul, Turkey, April 13-17, 2008. Proceedings},
  pages     = {509--526},
  year      = {2008},
  crossref  = {DBLP:conf/eurocrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-78967-3_29},
  doi       = {10.1007/978-3-540-78967-3_29},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/DamgardNW08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CramerDFPW08,
  author    = {Ronald Cramer and
               Yevgeniy Dodis and
               Serge Fehr and
               Carles Padr{\'{o}} and
               Daniel Wichs},
  title     = {Detection of Algebraic Manipulation with Applications to Robust Secret
               Sharing and Fuzzy Extractors},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {30},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/030},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CramerDFPW08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DodisW08,
  author    = {Yevgeniy Dodis and
               Daniel Wichs},
  title     = {Non-Malleable Extractors and Symmetric Key Cryptography from Weak
               Secrets},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {503},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/503},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DodisW08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GarayWZ08,
  author    = {Juan A. Garay and
               Daniel Wichs and
               Hong{-}Sheng Zhou},
  title     = {Somewhat Non-Committing Encryption and Efficient Adaptively Secure
               Oblivious Transfer},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {534},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/534},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GarayWZ08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNW07,
  author    = {Ivan Damg{\aa}rd and
               Jesper Buus Nielsen and
               Daniel Wichs},
  title     = {Isolated Proofs of Knowledge and Isolated Zero Knowledge},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {331},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/331},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DamgardNW07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNW07a,
  author    = {Ivan Damg{\aa}rd and
               Jesper Buus Nielsen and
               Daniel Wichs},
  title     = {Universally Composable Multiparty Computation with Partially Isolated
               Parties},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {332},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/332},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/DamgardNW07a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-1,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10401},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63688-7},
  doi       = {10.1007/978-3-319-63688-7},
  isbn      = {978-3-319-63687-0},
  timestamp = {Mon, 14 Aug 2017 14:32:34 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2017-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2017,
  editor    = {Chris Umans},
  title     = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
               2017, Berkeley, CA, USA, October 15-17, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8100284},
  isbn      = {978-1-5386-3464-6},
  timestamp = {Thu, 16 Nov 2017 15:01:42 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-2,
  editor    = {Yael Kalai and
               Leonid Reyzin},
  title     = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10678},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70503-3},
  doi       = {10.1007/978-3-319-70503-3},
  isbn      = {978-3-319-70502-6},
  timestamp = {Tue, 07 Nov 2017 12:38:48 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2017-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-1,
  editor    = {Yael Kalai and
               Leonid Reyzin},
  title     = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10677},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70500-2},
  doi       = {10.1007/978-3-319-70500-2},
  isbn      = {978-3-319-70499-9},
  timestamp = {Tue, 07 Nov 2017 12:31:11 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2017-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-3,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9816},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53015-3},
  doi       = {10.1007/978-3-662-53015-3},
  isbn      = {978-3-662-53014-6},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2016-3},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-1,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9665},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49890-3},
  doi       = {10.1007/978-3-662-49890-3},
  isbn      = {978-3-662-49889-7},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2016-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-2,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9666},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49896-5},
  doi       = {10.1007/978-3-662-49896-5},
  isbn      = {978-3-662-49895-8},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2016,
  editor    = {Madhu Sudan},
  title     = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
               Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2840728},
  isbn      = {978-1-4503-4057-1},
  timestamp = {Mon, 18 Jan 2016 19:44:01 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2016,
  editor    = {Daniel Wichs and
               Yishay Mansour},
  title     = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
               of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2897518},
  isbn      = {978-1-4503-4132-5},
  timestamp = {Fri, 10 Jun 2016 10:30:30 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b2,
  editor    = {Martin Hirt and
               Adam D. Smith},
  title     = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9986},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53644-5},
  doi       = {10.1007/978-3-662-53644-5},
  isbn      = {978-3-662-53643-8},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2016b2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016a2,
  editor    = {Eyal Kushilevitz and
               Tal Malkin},
  title     = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9563},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49099-0},
  doi       = {10.1007/978-3-662-49099-0},
  isbn      = {978-3-662-49098-3},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2016a2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b1,
  editor    = {Martin Hirt and
               Adam D. Smith},
  title     = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9985},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53641-4},
  doi       = {10.1007/978-3-662-53641-4},
  isbn      = {978-3-662-53640-7},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2016b1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016a1,
  editor    = {Eyal Kushilevitz and
               Tal Malkin},
  title     = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9562},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49096-9},
  doi       = {10.1007/978-3-662-49096-9},
  isbn      = {978-3-662-49095-2},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2016a1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-1,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9452},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48797-6},
  doi       = {10.1007/978-3-662-48797-6},
  isbn      = {978-3-662-48796-9},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2015-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2015,
  editor    = {Tim Roughgarden},
  title     = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
               Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2688073},
  isbn      = {978-1-4503-3333-7},
  timestamp = {Sun, 25 Jan 2015 11:29:31 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2015,
  editor    = {Jonathan Katz},
  title     = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9020},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2},
  doi       = {10.1007/978-3-662-46447-2},
  isbn      = {978-3-662-46446-5},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pkc/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2015,
  editor    = {Rocco A. Servedio and
               Ronitt Rubinfeld},
  title     = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory
               of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2746539},
  isbn      = {978-1-4503-3536-2},
  timestamp = {Wed, 10 Jun 2015 17:10:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2015-1,
  editor    = {Yevgeniy Dodis and
               Jesper Buus Nielsen},
  title     = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9014},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46494-6},
  doi       = {10.1007/978-3-662-46494-6},
  isbn      = {978-3-662-46493-9},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2015-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-2,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8617},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44381-1},
  doi       = {10.1007/978-3-662-44381-1},
  isbn      = {978-3-662-44380-4},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2014-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2014,
  editor    = {Phong Q. Nguyen and
               Elisabeth Oswald},
  title     = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8441},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5},
  doi       = {10.1007/978-3-642-55220-5},
  isbn      = {978-3-642-55219-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2014,
  title     = {55th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
               2014, Philadelphia, PA, USA, October 18-21, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6975722},
  isbn      = {978-1-4799-6517-5},
  timestamp = {Thu, 23 Jun 2016 15:53:28 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-2,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8270},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42045-0},
  doi       = {10.1007/978-3-642-42045-0},
  isbn      = {978-3-642-42044-3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2013-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn      = {978-1-4503-2477-9},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40041-4},
  doi       = {10.1007/978-3-642-40041-4},
  isbn      = {978-3-642-40040-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2013-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9},
  doi       = {10.1007/978-3-642-38348-9},
  isbn      = {978-3-642-38347-2},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2013,
  editor    = {Robert D. Kleinberg},
  title     = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
               CA, USA, January 9-12, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2422436},
  isbn      = {978-1-4503-1859-4},
  timestamp = {Sun, 17 Feb 2013 11:19:02 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pet/2013,
  editor    = {Emiliano De Cristofaro and
               Matthew K. Wright},
  title     = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
               2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7981},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39077-7},
  doi       = {10.1007/978-3-642-39077-7},
  isbn      = {978-3-642-39076-0},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/pet/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2013,
  editor    = {Amit Sahai},
  title     = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
               2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7785},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-36594-2},
  doi       = {10.1007/978-3-642-36594-2},
  isbn      = {978-3-642-36593-5},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2012,
  editor    = {David Pointcheval and
               Thomas Johansson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7237},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4},
  doi       = {10.1007/978-3-642-29011-4},
  isbn      = {978-3-642-29010-7},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2012,
  editor    = {Ronald Cramer},
  title     = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7194},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9},
  doi       = {10.1007/978-3-642-28914-9},
  isbn      = {978-3-642-28913-2},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2011,
  editor    = {Phillip Rogaway},
  title     = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6841},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9},
  doi       = {10.1007/978-3-642-22792-9},
  isbn      = {978-3-642-22791-2},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2011,
  editor    = {Kenneth G. Paterson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6632},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20465-4},
  doi       = {10.1007/978-3-642-20465-4},
  isbn      = {978-3-642-20464-7},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2011,
  editor    = {Rafail Ostrovsky},
  title     = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
               2011, Palm Springs, CA, USA, October 22-25, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6108120},
  isbn      = {978-1-4577-1843-4},
  timestamp = {Mon, 15 Dec 2014 18:48:45 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2011,
  editor    = {Lance Fortnow and
               Salil P. Vadhan},
  title     = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC}
               2011, San Jose, CA, USA, 6-8 June 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0691-1},
  timestamp = {Tue, 22 May 2012 21:36:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2011,
  editor    = {Yuval Ishai},
  title     = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6597},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6},
  doi       = {10.1007/978-3-642-19571-6},
  isbn      = {978-3-642-19570-9},
  timestamp = {Tue, 13 Jun 2017 11:30:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2010,
  editor    = {Masayuki Abe},
  title     = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6477},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8},
  doi       = {10.1007/978-3-642-17373-8},
  isbn      = {978-3-642-17372-1},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2010,
  editor    = {Henri Gilbert},
  title     = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               French Riviera, May 30 - June 3, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6110},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5},
  doi       = {10.1007/978-3-642-13190-5},
  isbn      = {978-3-642-13189-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2010,
  title     = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5669376},
  isbn      = {978-0-7695-4244-7},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/focs/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2010,
  editor    = {Andrew Chi{-}Chih Yao},
  title     = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 5-7, 2010. Proceedings},
  publisher = {Tsinghua University Press},
  year      = {2010},
  isbn      = {978-7-302-21752-7},
  timestamp = {Mon, 27 Sep 2010 12:57:50 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/innovations/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2010,
  editor    = {Daniele Micciancio},
  title     = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5978},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2},
  doi       = {10.1007/978-3-642-11799-2},
  isbn      = {978-3-642-11798-5},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2009,
  editor    = {Shai Halevi},
  title     = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5677},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8},
  doi       = {10.1007/978-3-642-03356-8},
  isbn      = {978-3-642-03355-1},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icits/2009,
  editor    = {Kaoru Kurosawa},
  title     = {Information Theoretic Security, 4th International Conference, {ICITS}
               2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5973},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14496-7},
  doi       = {10.1007/978-3-642-14496-7},
  isbn      = {978-3-642-14495-0},
  timestamp = {Wed, 17 May 2017 10:54:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icits/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2009,
  editor    = {Michael Mitzenmacher},
  title     = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
               {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-506-2},
  timestamp = {Fri, 05 Jun 2009 09:31:27 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/stoc/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2009,
  editor    = {Omer Reingold},
  title     = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5444},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00457-5},
  doi       = {10.1007/978-3-642-00457-5},
  isbn      = {978-3-642-00456-8},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/tcc/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2008,
  editor    = {Nigel P. Smart},
  title     = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4965},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-78967-3},
  doi       = {10.1007/978-3-540-78967-3},
  isbn      = {978-3-540-78966-6},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier