BibTeX records: Sebastian Faust

download as .bib file

@article{DBLP:journals/ijisec/FaustH018,
  author    = {Sebastian Faust and
               Carmit Hazay and
               Daniele Venturi},
  title     = {Outsourced pattern matching},
  journal   = {Int. J. Inf. Sec.},
  volume    = {17},
  number    = {3},
  pages     = {327--346},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10207-017-0374-0},
  doi       = {10.1007/s10207-017-0374-0},
  timestamp = {Wed, 11 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/FaustH018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFH18,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Kristina Hostakova},
  title     = {Foundations of State Channel Networks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {320},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/320},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiFH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiEF18,
  author    = {Stefan Dziembowski and
               Lisa Eckey and
               Sebastian Faust},
  title     = {FairSwap: How to fairly exchange digital goods},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {740},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/740},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiEF18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardFMV17,
  author    = {Ivan Damg{\aa}rd and
               Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi},
  title     = {Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier},
  journal   = {J. Cryptology},
  volume    = {30},
  number    = {1},
  pages     = {152--190},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00145-015-9218-0},
  doi       = {10.1007/s00145-015-9218-0},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/DamgardFMV17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BalaschFGPS17,
  author    = {Josep Balasch and
               Sebastian Faust and
               Benedikt Gierlichs and
               Clara Paglialonga and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Consolidating Inner Product Masking},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  pages     = {724--754},
  year      = {2017},
  crossref  = {DBLP:conf/asiacrypt/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-70694-8\_25},
  doi       = {10.1007/978-3-319-70694-8\_25},
  timestamp = {Thu, 30 Nov 2017 13:06:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BalaschFGPS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FaustPS17,
  author    = {Sebastian Faust and
               Clara Paglialonga and
               Tobias Schneider},
  title     = {Amortizing Randomness Complexity in Private Circuits},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  pages     = {781--810},
  year      = {2017},
  crossref  = {DBLP:conf/asiacrypt/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-70694-8\_27},
  doi       = {10.1007/978-3-319-70694-8\_27},
  timestamp = {Tue, 22 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/FaustPS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FaustHM017,
  author    = {Sebastian Faust and
               Kristina Host{\'{a}}kov{\'{a}} and
               Pratyay Mukherjee and
               Daniele Venturi},
  title     = {Non-Malleable Codes for Space-Bounded Tampering},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  pages     = {95--126},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-63715-0\_4},
  doi       = {10.1007/978-3-319-63715-0\_4},
  timestamp = {Mon, 14 Aug 2017 14:37:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/FaustHM017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BartheDFGSS17,
  author    = {Gilles Barthe and
               Fran{\c{c}}ois Dupressoir and
               Sebastian Faust and
               Benjamin Gr{\'{e}}goire and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Pierre{-}Yves Strub},
  title     = {Parallel Implementations of Masking Schemes and the Bounded Moment
               Leakage Model},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  pages     = {535--566},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-56620-7\_19},
  doi       = {10.1007/978-3-319-56620-7\_19},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/BartheDFGSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrodyDFP17,
  author    = {Joshua Brody and
               Stefan Dziembowski and
               Sebastian Faust and
               Krzysztof Pietrzak},
  title     = {Position-Based Cryptography and Multiparty Communication Complexity},
  booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  pages     = {56--81},
  year      = {2017},
  crossref  = {DBLP:conf/tcc/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-70500-2\_3},
  doi       = {10.1007/978-3-319-70500-2\_3},
  timestamp = {Tue, 07 Nov 2017 12:31:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/BrodyDFP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHM017,
  author    = {Sebastian Faust and
               Kristina Hostakova and
               Pratyay Mukherjee and
               Daniele Venturi},
  title     = {Non-Malleable Codes for Space-Bounded Tampering},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {530},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/530},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustHM017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiEFM17,
  author    = {Stefan Dziembowski and
               Lisa Eckey and
               Sebastian Faust and
               Daniel Malinowski},
  title     = {{PERUN:} Virtual Payment Channels over Cryptographic Currencies},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {635},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/635},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiEFM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustGPPS17,
  author    = {Sebastian Faust and
               Vincent Grosso and
               Santos Merino Del Pozo and
               Clara Paglialonga and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Composable Masking Schemes in the Presence of Physical Defaults and
               the Robust Probing Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {711},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/711},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustGPPS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustPS17,
  author    = {Sebastian Faust and
               Clara Paglialonga and
               Tobias Schneider},
  title     = {Amortizing Randomness Complexity in Private Circuits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {869},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/869},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustPS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EckeyFL17,
  author    = {Lisa Eckey and
               Sebastian Faust and
               Julian Loss},
  title     = {Efficient Algorithms for Broadcast and Consensus Based on Proofs of
               Work},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {915},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/915},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/EckeyFL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschFGPS17,
  author    = {Josep Balasch and
               Sebastian Faust and
               Benedikt Gierlichs and
               Clara Paglialonga and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Consolidating Inner Product Masking},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1047},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1047},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BalaschFGPS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FaustHNNZ16,
  author    = {Sebastian Faust and
               Carmit Hazay and
               Jesper Buus Nielsen and
               Peter Sebastian Nordholt and
               Angela Zottarel},
  title     = {Signature Schemes Secure Against Hard-to-Invert Leakage},
  journal   = {J. Cryptology},
  volume    = {29},
  number    = {2},
  pages     = {422--455},
  year      = {2016},
  url       = {https://doi.org/10.1007/s00145-015-9197-1},
  doi       = {10.1007/s00145-015-9197-1},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/joc/FaustHNNZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FaustMVW16,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi and
               Daniel Wichs},
  title     = {Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering
               Circuits},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {62},
  number    = {12},
  pages     = {7179--7194},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIT.2016.2613919},
  doi       = {10.1109/TIT.2016.2613919},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/FaustMVW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DziembowskiFS16,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {142--153},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {http://doi.acm.org/10.1145/2976749.2978419},
  doi       = {10.1145/2976749.2978419},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/DziembowskiFS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFHJM16,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Gottfried Herold and
               Anthony Journault and
               Daniel Masny and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  pages     = {272--301},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-53008-5\_10},
  doi       = {10.1007/978-3-662-53008-5\_10},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/DziembowskiFHJM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AndrychowiczDF16,
  author    = {Marcin Andrychowicz and
               Stefan Dziembowski and
               Sebastian Faust},
  title     = {Circuit Compilers with O(1/{\textbackslash}log (n)) Leakage Rate},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  pages     = {586--615},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-49896-5\_21},
  doi       = {10.1007/978-3-662-49896-5\_21},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/AndrychowiczDF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustMV16,
  author    = {Sebastian Faust and
               Daniel Masny and
               Daniele Venturi},
  title     = {Chosen-Ciphertext Security from Subset Sum},
  booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
               March 6-9, 2016, Proceedings, Part {I}},
  pages     = {35--46},
  year      = {2016},
  crossref  = {DBLP:conf/pkc/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-49384-7\_2},
  doi       = {10.1007/978-3-662-49384-7\_2},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/FaustMV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DziembowskiFS16,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Maciej Sk{\'{o}}rski},
  title     = {Optimal Amplification of Noisy Leakages},
  booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  pages     = {291--318},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016a2},
  url       = {https://doi.org/10.1007/978-3-662-49099-0\_11},
  doi       = {10.1007/978-3-662-49099-0\_11},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/DziembowskiFS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndrychowiczDF16,
  author    = {Marcin Andrychowicz and
               Stefan Dziembowski and
               Sebastian Faust},
  title     = {Circuit Compilers with {O(1/} log(n)) Leakage Rate},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {173},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/173},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AndrychowiczDF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrodyDFP16,
  author    = {Joshua Brody and
               Stefan Dziembowski and
               Sebastian Faust and
               Krzysztof Pietrzak},
  title     = {Position-Based Cryptography and Multiparty Communication Complexity},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {536},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/536},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrodyDFP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFHJM16,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Gottfried Herold and
               Anthony Journault and
               Daniel Masny and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {573},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/573},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiFHJM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheDFGSS16,
  author    = {Gilles Barthe and
               Fran{\c{c}}ois Dupressoir and
               Sebastian Faust and
               Benjamin Gr{\'{e}}goire and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Pierre{-}Yves Strub},
  title     = {Parallel Implementations of Masking Schemes and the Bounded Moment
               Leakage Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {912},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/912},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BartheDFGSS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFS16,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1004},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1004},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiFS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFKP15,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Vladimir Kolmogorov and
               Krzysztof Pietrzak},
  title     = {Proofs of Space},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  pages     = {585--605},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48000-7\_29},
  doi       = {10.1007/978-3-662-48000-7\_29},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/DziembowskiFKP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AndrychowiczDDF15,
  author    = {Marcin Andrychowicz and
               Ivan Damg{\aa}rd and
               Stefan Dziembowski and
               Sebastian Faust and
               Antigoni Polychroniadou},
  title     = {Efficient Leakage Resilient Circuit Compilers},
  booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
               the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
               Proceedings},
  pages     = {311--329},
  year      = {2015},
  crossref  = {DBLP:conf/ctrsa/2015},
  url       = {https://doi.org/10.1007/978-3-319-16715-2\_17},
  doi       = {10.1007/978-3-319-16715-2\_17},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/AndrychowiczDDF15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DziembowskiFS15,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Maciej Skorski},
  title     = {Noisy Leakage Revisited},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  pages     = {159--188},
  year      = {2015},
  crossref  = {DBLP:conf/eurocrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-46803-6\_6},
  doi       = {10.1007/978-3-662-46803-6\_6},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/DziembowskiFS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DucFS15,
  author    = {Alexandre Duc and
               Sebastian Faust and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Making Masking Security Proofs Concrete - Or How to Evaluate the Security
               of Any Leaking Device},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  pages     = {401--429},
  year      = {2015},
  crossref  = {DBLP:conf/eurocrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-46800-5\_16},
  doi       = {10.1007/978-3-662-46800-5\_16},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/DucFS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BalaschFG15,
  author    = {Josep Balasch and
               Sebastian Faust and
               Benedikt Gierlichs},
  title     = {Inner Product Masking Revisited},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  pages     = {486--510},
  year      = {2015},
  crossref  = {DBLP:conf/eurocrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-46800-5\_19},
  doi       = {10.1007/978-3-662-46800-5\_19},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/BalaschFG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardFMV15,
  author    = {Ivan Damg{\aa}rd and
               Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi},
  title     = {The Chaining Lemma and Its Application},
  booktitle = {Information Theoretic Security - 8th International Conference, {ICITS}
               2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  pages     = {181--196},
  year      = {2015},
  crossref  = {DBLP:conf/icits/2015},
  url       = {https://doi.org/10.1007/978-3-319-17470-9\_11},
  doi       = {10.1007/978-3-319-17470-9\_11},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icits/DamgardFMV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustMNV15,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Jesper Buus Nielsen and
               Daniele Venturi},
  title     = {A Tamper and Leakage Resilient von Neumann Architecture},
  booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  pages     = {579--603},
  year      = {2015},
  crossref  = {DBLP:conf/pkc/2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2\_26},
  doi       = {10.1007/978-3-662-46447-2\_26},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/FaustMNV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschFG15,
  author    = {Josep Balasch and
               Sebastian Faust and
               Benedikt Gierlichs},
  title     = {Inner Product Masking Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {105},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/105},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BalaschFG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucFS15,
  author    = {Alexandre Duc and
               Sebastian Faust and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Making Masking Security Proofs Concrete Or How to Evaluate the Security
               of any Leaking Device},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {119},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/119},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucFS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossoSF15,
  author    = {Vincent Grosso and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Sebastian Faust},
  title     = {Masking vs. Multiparty Computation: How Large is the Gap for AES?},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {492},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/492},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GrossoSF15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMV15,
  author    = {Sebastian Faust and
               Daniel Masny and
               Daniele Venturi},
  title     = {Chosen-Ciphertext Security from Subset Sum},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1223},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1223},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustMV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GrossoSF14,
  author    = {Vincent Grosso and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Sebastian Faust},
  title     = {Masking vs. multiparty computation: how large is the gap for AES?},
  journal   = {J. Cryptographic Engineering},
  volume    = {4},
  number    = {1},
  pages     = {47--57},
  year      = {2014},
  url       = {https://doi.org/10.1007/s13389-014-0073-y},
  doi       = {10.1007/s13389-014-0073-y},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jce/GrossoSF14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/FaustRRTV14,
  author    = {Sebastian Faust and
               Tal Rabin and
               Leonid Reyzin and
               Eran Tromer and
               Vinod Vaikuntanathan},
  title     = {Protecting Circuits from Computationally Bounded and Noisy Leakage},
  journal   = {{SIAM} J. Comput.},
  volume    = {43},
  number    = {5},
  pages     = {1564--1614},
  year      = {2014},
  url       = {https://doi.org/10.1137/120880343},
  doi       = {10.1137/120880343},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/siamcomp/FaustRRTV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaustMVW14,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi and
               Daniel Wichs},
  title     = {Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering
               Circuits},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  pages     = {111--128},
  year      = {2014},
  crossref  = {DBLP:conf/eurocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5\_7},
  doi       = {10.1007/978-3-642-55220-5\_7},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/FaustMVW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DucDF14,
  author    = {Alexandre Duc and
               Stefan Dziembowski and
               Sebastian Faust},
  title     = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  pages     = {423--440},
  year      = {2014},
  crossref  = {DBLP:conf/eurocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5\_24},
  doi       = {10.1007/978-3-642-55220-5\_24},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/DucDF14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FaustMNV14,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Jesper Buus Nielsen and
               Daniele Venturi},
  title     = {Continuous Non-malleable Codes},
  booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  pages     = {465--488},
  year      = {2014},
  crossref  = {DBLP:conf/tcc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8\_20},
  doi       = {10.1007/978-3-642-54242-8\_20},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/FaustMNV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucDF14,
  author    = {Alexandre Duc and
               Stefan Dziembowski and
               Sebastian Faust},
  title     = {Unifying Leakage Models: from Probing Attacks to Noisy Leakage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {79},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/079},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DucDF14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMNV14,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Jesper Buus Nielsen and
               Daniele Venturi},
  title     = {Continuous Non-malleable Codes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {173},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/173},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustMNV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMNV14a,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Jesper Buus Nielsen and
               Daniele Venturi},
  title     = {A Tamper and Leakage Resilient Random Access Machine},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {338},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/338},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustMNV14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHV14a,
  author    = {Sebastian Faust and
               Carmit Hazay and
               Daniele Venturi},
  title     = {Outsourced Pattern Matching},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {662},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/662},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustHV14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFMV14,
  author    = {Ivan Damg{\aa}rd and
               Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi},
  title     = {The Chaining Lemma and its application},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {979},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/979},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DamgardFMV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardFMV13,
  author    = {Ivan Damg{\aa}rd and
               Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi},
  title     = {Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  pages     = {140--160},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-42045-0\_8},
  doi       = {10.1007/978-3-642-42045-0\_8},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/DamgardFMV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossoSF13,
  author    = {Vincent Grosso and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Sebastian Faust},
  title     = {Masking vs. Multiparty Computation: How Large Is the Gap for AES?},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
               Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  pages     = {400--416},
  year      = {2013},
  crossref  = {DBLP:conf/ches/2013},
  url       = {https://doi.org/10.1007/978-3-642-40349-1\_23},
  doi       = {10.1007/978-3-642-40349-1\_23},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/GrossoSF13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FaustHV13,
  author    = {Sebastian Faust and
               Carmit Hazay and
               Daniele Venturi},
  title     = {Outsourced Pattern Matching},
  booktitle = {Automata, Languages, and Programming - 40th International Colloquium,
               {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}},
  pages     = {545--556},
  year      = {2013},
  crossref  = {DBLP:conf/icalp/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-39212-2\_48},
  doi       = {10.1007/978-3-642-39212-2\_48},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/FaustHV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFMV13a,
  author    = {Ivan Damg{\aa}rd and
               Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi},
  title     = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {677},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/677},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DamgardFMV13a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMVW13,
  author    = {Sebastian Faust and
               Pratyay Mukherjee and
               Daniele Venturi and
               Daniel Wichs},
  title     = {Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering
               Circuits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {702},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/702},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustMVW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFKP13,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Vladimir Kolmogorov and
               Krzysztof Pietrzak},
  title     = {Proofs of Space},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {796},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/796},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiFKP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FaustHNNZ12,
  author    = {Sebastian Faust and
               Carmit Hazay and
               Jesper Buus Nielsen and
               Peter Sebastian Nordholt and
               Angela Zottarel},
  title     = {Signature Schemes Secure against Hard-to-Invert Leakage},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {98--115},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4\_8},
  doi       = {10.1007/978-3-642-34961-4\_8},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/FaustHNNZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BalaschFGV12,
  author    = {Josep Balasch and
               Sebastian Faust and
               Benedikt Gierlichs and
               Ingrid Verbauwhede},
  title     = {Theory and Practice of a Leakage Resilient Masking Scheme},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {758--775},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4\_45},
  doi       = {10.1007/978-3-642-34961-4\_45},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BalaschFGV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FaustPS12,
  author    = {Sebastian Faust and
               Krzysztof Pietrzak and
               Joachim Schipper},
  title     = {Practical Leakage-Resilient Symmetric Cryptography},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
               Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  pages     = {213--232},
  year      = {2012},
  crossref  = {DBLP:conf/ches/2012},
  url       = {https://doi.org/10.1007/978-3-642-33027-8\_13},
  doi       = {10.1007/978-3-642-33027-8\_13},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/FaustPS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/FaustKMV12,
  author    = {Sebastian Faust and
               Markulf Kohlweiss and
               Giorgia Azzurra Marson and
               Daniele Venturi},
  title     = {On the Non-malleability of the Fiat-Shamir Transform},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
               on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  pages     = {60--79},
  year      = {2012},
  crossref  = {DBLP:conf/indocrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34931-7\_5},
  doi       = {10.1007/978-3-642-34931-7\_5},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/FaustKMV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardFH12,
  author    = {Ivan Damg{\aa}rd and
               Sebastian Faust and
               Carmit Hazay},
  title     = {Secure Two-Party Computation with Low Communication},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {54--74},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9\_4},
  doi       = {10.1007/978-3-642-28914-9\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/DamgardFH12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DziembowskiF12,
  author    = {Stefan Dziembowski and
               Sebastian Faust},
  title     = {Leakage-Resilient Circuits without Computational Assumptions},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {230--247},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9\_13},
  doi       = {10.1007/978-3-642-28914-9\_13},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/DziembowskiF12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHNNZ12,
  author    = {Sebastian Faust and
               Carmit Hazay and
               Jesper Buus Nielsen and
               Peter Sebastian Nordholt and
               Angela Zottarel},
  title     = {Signature Schemes Secure against Hard-to-Invert Leakage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {45},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/045},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustHNNZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKMV12,
  author    = {Sebastian Faust and
               Markulf Kohlweiss and
               Giorgia Azzurra Marson and
               Daniele Venturi},
  title     = {On the Non-malleability of the Fiat-Shamir Transform},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {704},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/704},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustKMV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DziembowskiF11,
  author    = {Stefan Dziembowski and
               Sebastian Faust},
  title     = {Leakage-Resilient Cryptography from the Inner-Product Extractor},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  pages     = {702--721},
  year      = {2011},
  crossref  = {DBLP:conf/asiacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0\_38},
  doi       = {10.1007/978-3-642-25385-0\_38},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/DziembowskiF11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FaustPV11,
  author    = {Sebastian Faust and
               Krzysztof Pietrzak and
               Daniele Venturi},
  title     = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  booktitle = {Automata, Languages and Programming - 38th International Colloquium,
               {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
               {I}},
  pages     = {391--402},
  year      = {2011},
  crossref  = {DBLP:conf/icalp/2011-1},
  url       = {https://doi.org/10.1007/978-3-642-22006-7\_33},
  doi       = {10.1007/978-3-642-22006-7\_33},
  timestamp = {Thu, 15 Jun 2017 21:39:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/FaustPV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustPV11,
  author    = {Sebastian Faust and
               Krzysztof Pietrzak and
               Daniele Venturi},
  title     = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {314},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/314},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustPV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFH11,
  author    = {Ivan Damg{\aa}rd and
               Sebastian Faust and
               Carmit Hazay},
  title     = {Secure Two-Party Computation with Low Communication},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {508},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/508},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DamgardFH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiF11,
  author    = {Stefan Dziembowski and
               Sebastian Faust},
  title     = {Leakage-Resilient Cryptography From the Inner-Product Extractor},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {519},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/519},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiF11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaustRRTV10,
  author    = {Sebastian Faust and
               Tal Rabin and
               Leonid Reyzin and
               Eran Tromer and
               Vinod Vaikuntanathan},
  title     = {Protecting Circuits from Leakage: the Computationally-Bounded and
               Noisy Cases},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  pages     = {135--156},
  year      = {2010},
  crossref  = {DBLP:conf/eurocrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5\_7},
  doi       = {10.1007/978-3-642-13190-5\_7},
  timestamp = {Wed, 11 Jul 2018 09:46:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/FaustRRTV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FaustKPR10,
  author    = {Sebastian Faust and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Guy N. Rothblum},
  title     = {Leakage-Resilient Signatures},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {343--360},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2\_21},
  doi       = {10.1007/978-3-642-11799-2\_21},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/FaustKPR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKPR09,
  author    = {Sebastian Faust and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Guy N. Rothblum},
  title     = {Leakage-Resilient Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {282},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/282},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustKPR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustRT09,
  author    = {Sebastian Faust and
               Leonid Reyzin and
               Eran Tromer},
  title     = {Protecting Circuits from Computationally-Bounded Leakage},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {379},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/379},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustRT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustKL08,
  author    = {Sebastian Faust and
               Emilia K{\"{a}}sper and
               Stefan Lucks},
  title     = {Efficient Simultaneous Broadcast},
  booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
               on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
               March 9-12, 2008. Proceedings},
  pages     = {180--196},
  year      = {2008},
  crossref  = {DBLP:conf/pkc/2008},
  url       = {https://doi.org/10.1007/978-3-540-78440-1\_11},
  doi       = {10.1007/978-3-540-78440-1\_11},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/FaustKL08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DanezisDFKTP07,
  author    = {George Danezis and
               Claudia D{\'{\i}}az and
               Sebastian Faust and
               Emilia K{\"{a}}sper and
               Carmela Troncoso and
               Bart Preneel},
  title     = {Efficient Negative Databases from Cryptographic Hash Functions},
  booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
               Chile, October 9-12, 2007, Proceedings},
  pages     = {423--436},
  year      = {2007},
  crossref  = {DBLP:conf/isw/2007},
  url       = {https://doi.org/10.1007/978-3-540-75496-1\_28},
  doi       = {10.1007/978-3-540-75496-1\_28},
  timestamp = {Sat, 16 Sep 2017 12:10:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/DanezisDFKTP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/KohlweissFFGP07,
  author    = {Markulf Kohlweiss and
               Sebastian Faust and
               Lothar Fritsch and
               Bartek Gedrojc and
               Bart Preneel},
  title     = {Efficient Oblivious Augmented Maps: Location-Based Services with a
               Payment Broker},
  booktitle = {Privacy Enhancing Technologies, 7th International Symposium, {PET}
               2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers},
  pages     = {77--94},
  year      = {2007},
  crossref  = {DBLP:conf/pet/2007},
  url       = {https://doi.org/10.1007/978-3-540-75551-7\_6},
  doi       = {10.1007/978-3-540-75551-7\_6},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/KohlweissFFGP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2017-1,
  editor    = {Tsuyoshi Takagi and
               Thomas Peyrin},
  title     = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10624},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70694-8},
  doi       = {10.1007/978-3-319-70694-8},
  isbn      = {978-3-319-70693-1},
  timestamp = {Thu, 30 Nov 2017 13:06:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-2,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10402},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63715-0},
  doi       = {10.1007/978-3-319-63715-0},
  isbn      = {978-3-319-63714-3},
  timestamp = {Mon, 14 Aug 2017 14:37:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-1,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10210},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56620-7},
  doi       = {10.1007/978-3-319-56620-7},
  isbn      = {978-3-319-56619-1},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-1,
  editor    = {Yael Kalai and
               Leonid Reyzin},
  title     = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10677},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70500-2},
  doi       = {10.1007/978-3-319-70500-2},
  isbn      = {978-3-319-70499-9},
  timestamp = {Tue, 07 Nov 2017 12:31:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-2,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9815},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53008-5},
  doi       = {10.1007/978-3-662-53008-5},
  isbn      = {978-3-662-53007-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-2,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9666},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49896-5},
  doi       = {10.1007/978-3-662-49896-5},
  isbn      = {978-3-662-49895-8},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2016-1,
  editor    = {Chen{-}Mou Cheng and
               Kai{-}Min Chung and
               Giuseppe Persiano and
               Bo{-}Yin Yang},
  title     = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
               March 6-9, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9614},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49384-7},
  doi       = {10.1007/978-3-662-49384-7},
  isbn      = {978-3-662-49383-0},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016a2,
  editor    = {Eyal Kushilevitz and
               Tal Malkin},
  title     = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9563},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49099-0},
  doi       = {10.1007/978-3-662-49099-0},
  isbn      = {978-3-662-49098-3},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2016a2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9216},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48000-7},
  doi       = {10.1007/978-3-662-48000-7},
  isbn      = {978-3-662-47999-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2015,
  editor    = {Kaisa Nyberg},
  title     = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
               the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9048},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-16715-2},
  doi       = {10.1007/978-3-319-16715-2},
  isbn      = {978-3-319-16714-5},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-2,
  editor    = {Elisabeth Oswald and
               Marc Fischlin},
  title     = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9057},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46803-6},
  doi       = {10.1007/978-3-662-46803-6},
  isbn      = {978-3-662-46802-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-1,
  editor    = {Elisabeth Oswald and
               Marc Fischlin},
  title     = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9056},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46800-5},
  doi       = {10.1007/978-3-662-46800-5},
  isbn      = {978-3-662-46799-2},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2015,
  editor    = {Anja Lehmann and
               Stefan Wolf},
  title     = {Information Theoretic Security - 8th International Conference, {ICITS}
               2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9063},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17470-9},
  doi       = {10.1007/978-3-319-17470-9},
  isbn      = {978-3-319-17469-3},
  timestamp = {Wed, 17 May 2017 10:54:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icits/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2015,
  editor    = {Jonathan Katz},
  title     = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9020},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2},
  doi       = {10.1007/978-3-662-46447-2},
  isbn      = {978-3-662-46446-5},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2014,
  editor    = {Phong Q. Nguyen and
               Elisabeth Oswald},
  title     = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8441},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5},
  doi       = {10.1007/978-3-642-55220-5},
  isbn      = {978-3-642-55219-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2014,
  editor    = {Yehuda Lindell},
  title     = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8349},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8},
  doi       = {10.1007/978-3-642-54242-8},
  isbn      = {978-3-642-54241-1},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-2,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8270},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42045-0},
  doi       = {10.1007/978-3-642-42045-0},
  isbn      = {978-3-642-42044-3},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2013-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2013,
  editor    = {Guido Bertoni and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
               Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8086},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40349-1},
  doi       = {10.1007/978-3-642-40349-1},
  isbn      = {978-3-642-40348-4},
  timestamp = {Sun, 21 May 2017 00:18:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2013-2,
  editor    = {Fedor V. Fomin and
               Rusins Freivalds and
               Marta Z. Kwiatkowska and
               David Peleg},
  title     = {Automata, Languages, and Programming - 40th International Colloquium,
               {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {7966},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39212-2},
  doi       = {10.1007/978-3-642-39212-2},
  isbn      = {978-3-642-39211-5},
  timestamp = {Tue, 23 May 2017 01:08:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2013-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2012,
  editor    = {Xiaoyun Wang and
               Kazue Sako},
  title     = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7658},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4},
  doi       = {10.1007/978-3-642-34961-4},
  isbn      = {978-3-642-34960-7},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2012,
  editor    = {Emmanuel Prouff and
               Patrick Schaumont},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
               Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7428},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33027-8},
  doi       = {10.1007/978-3-642-33027-8},
  isbn      = {978-3-642-33026-1},
  timestamp = {Sun, 21 May 2017 00:18:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2012,
  editor    = {Steven D. Galbraith and
               Mridul Nandi},
  title     = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
               on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7668},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34931-7},
  doi       = {10.1007/978-3-642-34931-7},
  isbn      = {978-3-642-34930-0},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2012,
  editor    = {Ronald Cramer},
  title     = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7194},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9},
  doi       = {10.1007/978-3-642-28914-9},
  isbn      = {978-3-642-28913-2},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2011,
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0},
  doi       = {10.1007/978-3-642-25385-0},
  isbn      = {978-3-642-25384-3},
  timestamp = {Wed, 10 Jan 2018 08:32:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2011-1,
  editor    = {Luca Aceto and
               Monika Henzinger and
               Jir{\'{\i}} Sgall},
  title     = {Automata, Languages and Programming - 38th International Colloquium,
               {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {6755},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22006-7},
  doi       = {10.1007/978-3-642-22006-7},
  isbn      = {978-3-642-22005-0},
  timestamp = {Thu, 15 Jun 2017 21:39:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2011-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2010,
  editor    = {Henri Gilbert},
  title     = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6110},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5},
  doi       = {10.1007/978-3-642-13190-5},
  isbn      = {978-3-642-13189-9},
  timestamp = {Wed, 11 Jul 2018 09:46:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2010,
  editor    = {Daniele Micciancio},
  title     = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5978},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2},
  doi       = {10.1007/978-3-642-11799-2},
  isbn      = {978-3-642-11798-5},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2008,
  editor    = {Ronald Cramer},
  title     = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
               on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
               March 9-12, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4939},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-78440-1},
  doi       = {10.1007/978-3-540-78440-1},
  isbn      = {978-3-540-78439-5},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2007,
  editor    = {Juan A. Garay and
               Arjen K. Lenstra and
               Masahiro Mambo and
               Ren{\'{e}} Peralta},
  title     = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
               Chile, October 9-12, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4779},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-75496-1},
  doi       = {10.1007/978-3-540-75496-1},
  isbn      = {978-3-540-75495-4},
  timestamp = {Sat, 16 Sep 2017 12:10:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2007,
  editor    = {Nikita Borisov and
               Philippe Golle},
  title     = {Privacy Enhancing Technologies, 7th International Symposium, {PET}
               2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4776},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-75551-7},
  doi       = {10.1007/978-3-540-75551-7},
  isbn      = {978-3-540-75550-0},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier