BibTeX records: Léo Ducas

download as .bib file

@article{DBLP:journals/dcc/DucasW18,
  author    = {L{\'{e}}o Ducas and
               Wessel P. J. van Woerden},
  title     = {The closest vector problem in tensored root lattices of type {A} and
               in their duals},
  journal   = {Des. Codes Cryptography},
  volume    = {86},
  number    = {1},
  pages     = {137--150},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10623-017-0332-x},
  doi       = {10.1007/s10623-017-0332-x},
  timestamp = {Fri, 12 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/DucasW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DucasKLLSSS18,
  author    = {L{\'{e}}o Ducas and
               Eike Kiltz and
               Tancr{\`{e}}de Lepoint and
               Vadim Lyubashevsky and
               Peter Schwabe and
               Gregor Seiler and
               Damien Stehl{\'{e}}},
  title     = {CRYSTALS-Dilithium: {A} Lattice-Based Digital Signature Scheme},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {238--268},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.238-268},
  doi       = {10.13154/tches.v2018.i1.238-268},
  timestamp = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tches/DucasKLLSSS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BonnoronDF18,
  author    = {Guillaume Bonnoron and
               L{\'{e}}o Ducas and
               Max Fillinger},
  title     = {Large {FHE} Gates from Tensored Homomorphic Accumulator},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  pages     = {217--251},
  year      = {2018},
  crossref  = {DBLP:conf/africacrypt/2018},
  url       = {https://doi.org/10.1007/978-3-319-89339-6\_13},
  doi       = {10.1007/978-3-319-89339-6\_13},
  timestamp = {Mon, 16 Apr 2018 14:29:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/BonnoronDF18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DucasP18,
  author    = {L{\'{e}}o Ducas and
               Alice Pellet{-}Mary},
  title     = {On the Statistical Leak of the {GGH13} Multilinear Map and Some Variants},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  pages     = {465--493},
  year      = {2018},
  crossref  = {DBLP:conf/asiacrypt/2018-1},
  url       = {https://doi.org/10.1007/978-3-030-03326-2\_16},
  doi       = {10.1007/978-3-030-03326-2\_16},
  timestamp = {Thu, 22 Nov 2018 11:17:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/DucasP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YuD18,
  author    = {Yang Yu and
               L{\'{e}}o Ducas},
  title     = {Learning Strikes Again: The Case of the {DRS} Signature Scheme},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  pages     = {525--543},
  year      = {2018},
  crossref  = {DBLP:conf/asiacrypt/2018-2},
  url       = {https://doi.org/10.1007/978-3-030-03329-3\_18},
  doi       = {10.1007/978-3-030-03329-3\_18},
  timestamp = {Thu, 22 Nov 2018 11:22:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/YuD18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Ducas18,
  author    = {L{\'{e}}o Ducas},
  title     = {Shortest Vector from Lattice Sieving: {A} Few Dimensions for Free},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  pages     = {125--145},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-1},
  url       = {https://doi.org/10.1007/978-3-319-78381-9\_5},
  doi       = {10.1007/978-3-319-78381-9\_5},
  timestamp = {Mon, 16 Apr 2018 13:48:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Ducas18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BosDKLLSSSS18,
  author    = {Joppe W. Bos and
               L{\'{e}}o Ducas and
               Eike Kiltz and
               Tancr{\`{e}}de Lepoint and
               Vadim Lyubashevsky and
               John M. Schanck and
               Peter Schwabe and
               Gregor Seiler and
               Damien Stehl{\'{e}}},
  title     = {{CRYSTALS} - Kyber: {A} CCA-Secure Module-Lattice-Based {KEM}},
  booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2018, London, United Kingdom, April 24-26, 2018},
  pages     = {353--367},
  year      = {2018},
  crossref  = {DBLP:conf/eurosp/2018},
  url       = {https://doi.org/10.1109/EuroSP.2018.00032},
  doi       = {10.1109/EuroSP.2018.00032},
  timestamp = {Wed, 11 Jul 2018 11:39:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/BosDKLLSSSS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenhamoudaBDQ18,
  author    = {Fabrice Benhamouda and
               Olivier Blazy and
               L{\'{e}}o Ducas and
               Willy Quach},
  title     = {Hash Proof Systems over Lattices Revisited},
  booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
               Brazil, March 25-29, 2018, Proceedings, Part {II}},
  pages     = {644--674},
  year      = {2018},
  crossref  = {DBLP:conf/pkc/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-76581-5\_22},
  doi       = {10.1007/978-3-319-76581-5\_22},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BenhamoudaBDQ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BoerDJW18,
  author    = {Koen de Boer and
               L{\'{e}}o Ducas and
               Stacey Jeffery and
               Ronald de Wolf},
  title     = {Attacks on the {AJPS} Mersenne-Based Cryptosystem},
  booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  pages     = {101--120},
  year      = {2018},
  crossref  = {DBLP:conf/pqcrypto/2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3\_5},
  doi       = {10.1007/978-3-319-79063-3\_5},
  timestamp = {Thu, 05 Apr 2018 12:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/BoerDJW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/VeugenAHD18,
  author    = {Thijs Veugen and
               Thomas Attema and
               Maran van Heesch and
               L{\'{e}}o Ducas},
  title     = {Preparing Ourselves for the Threats of the Post-Quantum Era},
  journal   = {{ERCIM} News},
  volume    = {2018},
  number    = {112},
  year      = {2018},
  url       = {https://ercim-news.ercim.eu/en112/special/preparing-ourselves-for-the-threats-of-the-post-quantum-era},
  timestamp = {Thu, 25 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ercim/VeugenAHD18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasP18,
  author    = {L{\'{e}}o Ducas and
               C{\'{e}}cile Pierrot},
  title     = {Polynomial Time Bounded Distance Decoding near Minkowski's Bound in
               Discrete Logarithm Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {146},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/146},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuD18,
  author    = {Yang Yu and
               L{\'{e}}o Ducas},
  title     = {Learning strikes again: the case of the {DRS} signature scheme},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {294},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/294},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/YuD18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDW17,
  author    = {Ronald Cramer and
               L{\'{e}}o Ducas and
               Benjamin Wesolowski},
  title     = {Short Stickelberger Class Relations and Application to Ideal-SVP},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  pages     = {324--348},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-56620-7\_12},
  doi       = {10.1007/978-3-319-56620-7\_12},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CramerDW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/YuD17,
  author    = {Yang Yu and
               L{\'{e}}o Ducas},
  title     = {Second Order Statistical Behavior of {LLL} and {BKZ}},
  booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
               Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  pages     = {3--22},
  year      = {2017},
  crossref  = {DBLP:conf/sacrypt/2017},
  url       = {https://doi.org/10.1007/978-3-319-72565-9\_1},
  doi       = {10.1007/978-3-319-72565-9\_1},
  timestamp = {Fri, 12 Jan 2018 11:12:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/YuD17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasP17,
  author    = {L{\'{e}}o Ducas and
               Alice Pellet{-}Mary},
  title     = {On the Statistical Leak of the {GGH13} Multilinear Map and some Variants},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {482},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/482},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasLLSSS17,
  author    = {L{\'{e}}o Ducas and
               Tancr{\`{e}}de Lepoint and
               Vadim Lyubashevsky and
               Peter Schwabe and
               Gregor Seiler and
               Damien Stehl{\'{e}}},
  title     = {{CRYSTALS} - Dilithium: Digital Signatures from Module Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {633},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/633},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasLLSSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosDKLLSSS17,
  author    = {Joppe W. Bos and
               L{\'{e}}o Ducas and
               Eike Kiltz and
               Tancr{\`{e}}de Lepoint and
               Vadim Lyubashevsky and
               John M. Schanck and
               Peter Schwabe and
               Damien Stehl{\'{e}}},
  title     = {{CRYSTALS} - Kyber: a CCA-secure module-lattice-based {KEM}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {634},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/634},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BosDKLLSSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuD17,
  author    = {Yang Yu and
               L{\'{e}}o Ducas},
  title     = {Second Order Statistical Behavior of {LLL} and {BKZ}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {730},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/730},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/YuD17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnoronDF17,
  author    = {Guillaume Bonnoron and
               L{\'{e}}o Ducas and
               Max Fillinger},
  title     = {Large {FHE} gates from Tensored Homomorphic Accumulator},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {996},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/996},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BonnoronDF17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaBDQ17,
  author    = {Fabrice Benhamouda and
               Olivier Blazy and
               L{\'{e}}o Ducas and
               Willy Quach},
  title     = {Hash Proof Systems over Lattices Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {997},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/997},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BenhamoudaBDQ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ducas17,
  author    = {L{\'{e}}o Ducas},
  title     = {Shortest Vector from Lattice Sieving: a Few Dimensions for Free},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {999},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/999},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Ducas17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoerDJW17,
  author    = {Koen de Boer and
               L{\'{e}}o Ducas and
               Stacey Jeffery and
               Ronald de Wolf},
  title     = {Attacks on the {AJPS} Mersenne-based cryptosystem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1171},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1171},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BoerDJW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BosCDMNNRS16,
  author    = {Joppe W. Bos and
               Craig Costello and
               L{\'{e}}o Ducas and
               Ilya Mironov and
               Michael Naehrig and
               Valeria Nikolaenko and
               Ananth Raghunathan and
               Douglas Stebila},
  title     = {Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from
               {LWE}},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1006--1018},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {https://doi.org/10.1145/2976749.2978425},
  doi       = {10.1145/2976749.2978425},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BosCDMNNRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtBD16,
  author    = {Martin R. Albrecht and
               Shi Bai and
               L{\'{e}}o Ducas},
  title     = {A Subfield Lattice Attack on Overstretched {NTRU} Assumptions - Cryptanalysis
               of Some {FHE} and Graded Encoding Schemes},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  pages     = {153--178},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53018-4\_6},
  doi       = {10.1007/978-3-662-53018-4\_6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/AlbrechtBD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DucasS16,
  author    = {L{\'{e}}o Ducas and
               Damien Stehl{\'{e}}},
  title     = {Sanitization of {FHE} Ciphertexts},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  pages     = {294--310},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-49890-3\_12},
  doi       = {10.1007/978-3-662-49890-3\_12},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/DucasS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDPR16,
  author    = {Ronald Cramer and
               L{\'{e}}o Ducas and
               Chris Peikert and
               Oded Regev},
  title     = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  pages     = {559--585},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-49896-5\_20},
  doi       = {10.1007/978-3-662-49896-5\_20},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CramerDPR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/DucasP16,
  author    = {L{\'{e}}o Ducas and
               Thomas Prest},
  title     = {Fast Fourier Orthogonalization},
  booktitle = {Proceedings of the {ACM} on International Symposium on Symbolic and
               Algebraic Computation, {ISSAC} 2016, Waterloo, ON, Canada, July 19-22,
               2016},
  pages     = {191--198},
  year      = {2016},
  crossref  = {DBLP:conf/issac/2016},
  url       = {https://doi.org/10.1145/2930889.2930923},
  doi       = {10.1145/2930889.2930923},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/issac/DucasP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/BeckerDGL16,
  author    = {Anja Becker and
               L{\'{e}}o Ducas and
               Nicolas Gama and
               Thijs Laarhoven},
  title     = {New directions in nearest neighbor searching with applications to
               lattice sieving},
  booktitle = {Proceedings of the Twenty-Seventh Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2016, Arlington, VA, USA, January 10-12, 2016},
  pages     = {10--24},
  year      = {2016},
  crossref  = {DBLP:conf/soda/2016},
  url       = {https://doi.org/10.1137/1.9781611974331.ch2},
  doi       = {10.1137/1.9781611974331.ch2},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/soda/BeckerDGL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlkimDPS16,
  author    = {Erdem Alkim and
               L{\'{e}}o Ducas and
               Thomas P{\"{o}}ppelmann and
               Peter Schwabe},
  title     = {Post-quantum Key Exchange - {A} New Hope},
  booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016.},
  pages     = {327--343},
  year      = {2016},
  crossref  = {DBLP:conf/uss/2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/alkim},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/AlkimDPS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtBD16,
  author    = {Martin R. Albrecht and
               Shi Bai and
               L{\'{e}}o Ducas},
  title     = {A subfield lattice attack on overstretched {NTRU} assumptions: Cryptanalysis
               of some {FHE} and Graded Encoding Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {127},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/127},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlbrechtBD16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasS16,
  author    = {L{\'{e}}o Ducas and
               Damien Stehl{\'{e}}},
  title     = {Sanitization of {FHE} Ciphertexts},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {164},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/164},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCDMNNRS16,
  author    = {Joppe W. Bos and
               Craig Costello and
               L{\'{e}}o Ducas and
               Ilya Mironov and
               Michael Naehrig and
               Valeria Nikolaenko and
               Ananth Raghunathan and
               Douglas Stebila},
  title     = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from
               {LWE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {659},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/659},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BosCDMNNRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDW16,
  author    = {Ronald Cramer and
               L{\'{e}}o Ducas and
               Benjamin Wesolowski},
  title     = {Short Stickelberger Class Relations and application to Ideal-SVP},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {885},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/885},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CramerDW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasW16,
  author    = {L{\'{e}}o Ducas and
               Wessel P. J. van Woerden},
  title     = {The closest vector problem in tensored root lattices of type {A} and
               in their duals},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {910},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/910},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlkimDPS16,
  author    = {Erdem Alkim and
               L{\'{e}}o Ducas and
               Thomas P{\"{o}}ppelmann and
               Peter Schwabe},
  title     = {NewHope without reconciliation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1157},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1157},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlkimDPS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DucasM15,
  author    = {L{\'{e}}o Ducas and
               Daniele Micciancio},
  title     = {{FHEW:} Bootstrapping Homomorphic Encryption in Less Than a Second},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  pages     = {617--640},
  year      = {2015},
  crossref  = {DBLP:conf/eurocrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-46800-5\_24},
  doi       = {10.1007/978-3-662-46800-5\_24},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/DucasM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDPR15,
  author    = {Ronald Cramer and
               L{\'{e}}o Ducas and
               Chris Peikert and
               Oded Regev},
  title     = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {313},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/313},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CramerDPR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasP15a,
  author    = {L{\'{e}}o Ducas and
               Thomas Prest},
  title     = {Fast Fourier Orthogonalization},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1014},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1014},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasP15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlkimDPS15,
  author    = {Erdem Alkim and
               L{\'{e}}o Ducas and
               Thomas P{\"{o}}ppelmann and
               Peter Schwabe},
  title     = {Post-quantum key exchange - a new hope},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1092},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1092},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlkimDPS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerDGL15,
  author    = {Anja Becker and
               L{\'{e}}o Ducas and
               Nicolas Gama and
               Thijs Laarhoven},
  title     = {New directions in nearest neighbor searching with applications to
               lattice sieving},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1128},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1128},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BeckerDGL15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DucasLP14,
  author    = {L{\'{e}}o Ducas and
               Vadim Lyubashevsky and
               Thomas Prest},
  title     = {Efficient Identity-Based Encryption over {NTRU} Lattices},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  pages     = {22--41},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-662-45608-8\_2},
  doi       = {10.1007/978-3-662-45608-8\_2},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/DucasLP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoppelmannDG14,
  author    = {Thomas P{\"{o}}ppelmann and
               L{\'{e}}o Ducas and
               Tim G{\"{u}}neysu},
  title     = {Enhanced Lattice-Based Signatures on Reconfigurable Hardware},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
               Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  pages     = {353--370},
  year      = {2014},
  crossref  = {DBLP:conf/ches/2014},
  url       = {https://doi.org/10.1007/978-3-662-44709-3\_20},
  doi       = {10.1007/978-3-662-44709-3\_20},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/PoppelmannDG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucasM14,
  author    = {L{\'{e}}o Ducas and
               Daniele Micciancio},
  title     = {Improved Short Lattice Signatures in the Standard Model},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {335--352},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2\_19},
  doi       = {10.1007/978-3-662-44371-2\_19},
  timestamp = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/DucasM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoppelmannDG14,
  author    = {Thomas P{\"{o}}ppelmann and
               L{\'{e}}o Ducas and
               Tim G{\"{u}}neysu},
  title     = {Enhanced Lattice-Based Signatures on Reconfigurable Hardware},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {254},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/254},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/PoppelmannDG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasM14,
  author    = {L{\'{e}}o Ducas and
               Daniele Micciancio},
  title     = {Improved Short Lattice Signatures in the Standard Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {495},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/495},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasLP14,
  author    = {L{\'{e}}o Ducas and
               Vadim Lyubashevsky and
               Thomas Prest},
  title     = {E fficient Identity-Based Encryption over {NTRU} Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {794},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/794},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasLP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasM14a,
  author    = {L{\'{e}}o Ducas and
               Daniele Micciancio},
  title     = {{FHE} Bootstrapping in less than a second},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {816},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/816},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasM14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ducas14,
  author    = {L{\'{e}}o Ducas},
  title     = {Accelerating Bliss: the geometry of ternary polynomials},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {874},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/874},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Ducas14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucasDLL13,
  author    = {L{\'{e}}o Ducas and
               Alain Durmus and
               Tancr{\`{e}}de Lepoint and
               Vadim Lyubashevsky},
  title     = {Lattice Signatures and Bimodal Gaussians},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {40--56},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4\_3},
  doi       = {10.1007/978-3-642-40041-4\_3},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/DucasDLL13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasDLL13,
  author    = {L{\'{e}}o Ducas and
               Alain Durmus and
               Tancr{\`{e}}de Lepoint and
               Vadim Lyubashevsky},
  title     = {Lattice Signatures and Bimodal Gaussians},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {383},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/383},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasDLL13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DucasN12,
  author    = {L{\'{e}}o Ducas and
               Phong Q. Nguyen},
  title     = {Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {415--432},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4\_26},
  doi       = {10.1007/978-3-642-34961-4\_26},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/DucasN12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DucasN12a,
  author    = {L{\'{e}}o Ducas and
               Phong Q. Nguyen},
  title     = {Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {433--450},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4\_27},
  doi       = {10.1007/978-3-642-34961-4\_27},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/DucasN12a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DucasD12,
  author    = {L{\'{e}}o Ducas and
               Alain Durmus},
  title     = {Ring-LWE in Polynomial Rings},
  booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  pages     = {34--51},
  year      = {2012},
  crossref  = {DBLP:conf/pkc/2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8\_3},
  doi       = {10.1007/978-3-642-30057-8\_3},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/DucasD12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasD12,
  author    = {L{\'{e}}o Ducas and
               Alain Durmus},
  title     = {Ring-LWE in Polynomial Rings},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {235},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/235},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucasD12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Ducas10,
  author    = {L{\'{e}}o Ducas},
  title     = {Anonymity from Asymmetry: New Constructions for Anonymous {HIBE}},
  booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
               the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
               Proceedings},
  pages     = {148--164},
  year      = {2010},
  crossref  = {DBLP:conf/ctrsa/2010},
  url       = {https://doi.org/10.1007/978-3-642-11925-5\_11},
  doi       = {10.1007/978-3-642-11925-5\_11},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/Ducas10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2018,
  editor    = {Antoine Joux and
               Abderrahmane Nitaj and
               Tajjeeddine Rachidi},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10831},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-89339-6},
  doi       = {10.1007/978-3-319-89339-6},
  isbn      = {978-3-319-89338-9},
  timestamp = {Mon, 16 Apr 2018 14:29:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2018-1,
  editor    = {Thomas Peyrin and
               Steven D. Galbraith},
  title     = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11272},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-03326-2},
  doi       = {10.1007/978-3-030-03326-2},
  isbn      = {978-3-030-03325-5},
  timestamp = {Thu, 22 Nov 2018 11:17:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2018-2,
  editor    = {Thomas Peyrin and
               Steven D. Galbraith},
  title     = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11273},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-03329-3},
  doi       = {10.1007/978-3-030-03329-3},
  isbn      = {978-3-030-03328-6},
  timestamp = {Thu, 22 Nov 2018 11:22:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-1,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10820},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78381-9},
  doi       = {10.1007/978-3-319-78381-9},
  isbn      = {978-3-319-78380-2},
  timestamp = {Mon, 16 Apr 2018 13:48:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2018,
  title     = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2018, London, United Kingdom, April 24-26, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8405665},
  isbn      = {978-1-5386-4228-3},
  timestamp = {Wed, 11 Jul 2018 11:39:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2018-2,
  editor    = {Michel Abdalla and
               Ricardo Dahab},
  title     = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
               Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10770},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-76581-5},
  doi       = {10.1007/978-3-319-76581-5},
  isbn      = {978-3-319-76580-8},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2018,
  editor    = {Tanja Lange and
               Rainer Steinwandt},
  title     = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10786},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3},
  doi       = {10.1007/978-3-319-79063-3},
  isbn      = {978-3-319-79062-6},
  timestamp = {Thu, 05 Apr 2018 12:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-1,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10210},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56620-7},
  doi       = {10.1007/978-3-319-56620-7},
  isbn      = {978-3-319-56619-1},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2017,
  editor    = {Carlisle Adams and
               Jan Camenisch},
  title     = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
               Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10719},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-72565-9},
  doi       = {10.1007/978-3-319-72565-9},
  isbn      = {978-3-319-72564-2},
  timestamp = {Fri, 12 Jan 2018 11:12:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-1,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9814},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53018-4},
  doi       = {10.1007/978-3-662-53018-4},
  isbn      = {978-3-662-53017-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-1,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9665},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49890-3},
  doi       = {10.1007/978-3-662-49890-3},
  isbn      = {978-3-662-49889-7},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-2,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9666},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49896-5},
  doi       = {10.1007/978-3-662-49896-5},
  isbn      = {978-3-662-49895-8},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issac/2016,
  editor    = {Sergei A. Abramov and
               Eugene V. Zima and
               Xiao{-}Shan Gao},
  title     = {Proceedings of the {ACM} on International Symposium on Symbolic and
               Algebraic Computation, {ISSAC} 2016, Waterloo, ON, Canada, July 19-22,
               2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2930889},
  isbn      = {978-1-4503-4380-0},
  timestamp = {Tue, 19 Jul 2016 11:21:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/issac/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soda/2016,
  editor    = {Robert Krauthgamer},
  title     = {Proceedings of the Twenty-Seventh Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2016, Arlington, VA, USA, January 10-12, 2016},
  publisher = {{SIAM}},
  year      = {2016},
  url       = {https://doi.org/10.1137/1.9781611974331},
  doi       = {10.1137/1.9781611974331},
  isbn      = {978-1-61197-433-1},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/soda/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2016,
  editor    = {Thorsten Holz and
               Stefan Savage},
  title     = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
               USA, August 10-12, 2016},
  publisher = {{USENIX} Association},
  year      = {2016},
  url       = {https://www.usenix.org/conference/usenixsecurity16},
  timestamp = {Mon, 05 Sep 2016 15:32:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-1,
  editor    = {Elisabeth Oswald and
               Marc Fischlin},
  title     = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9056},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46800-5},
  doi       = {10.1007/978-3-662-46800-5},
  isbn      = {978-3-662-46799-2},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8874},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45608-8},
  doi       = {10.1007/978-3-662-45608-8},
  isbn      = {978-3-662-45607-1},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2014,
  editor    = {Lejla Batina and
               Matthew Robshaw},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
               Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8731},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44709-3},
  doi       = {10.1007/978-3-662-44709-3},
  isbn      = {978-3-662-44708-6},
  timestamp = {Sun, 21 May 2017 00:18:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40041-4},
  doi       = {10.1007/978-3-642-40041-4},
  isbn      = {978-3-642-40040-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2013-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2012,
  editor    = {Xiaoyun Wang and
               Kazue Sako},
  title     = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7658},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4},
  doi       = {10.1007/978-3-642-34961-4},
  isbn      = {978-3-642-34960-7},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2012,
  editor    = {Marc Fischlin and
               Johannes A. Buchmann and
               Mark Manulis},
  title     = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7293},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8},
  doi       = {10.1007/978-3-642-30057-8},
  isbn      = {978-3-642-30056-1},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2010,
  editor    = {Josef Pieprzyk},
  title     = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
               the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5985},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11925-5},
  doi       = {10.1007/978-3-642-11925-5},
  isbn      = {978-3-642-11924-8},
  timestamp = {Sun, 21 May 2017 00:20:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier