BibTeX records: David Galindo

download as .bib file

@inproceedings{DBLP:conf/eurosp/CortierGT18,
  author    = {V{\'{e}}ronique Cortier and
               David Galindo and
               Mathieu Turuani},
  title     = {A Formal Analysis of the Neuchatel e-Voting Protocol},
  booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2018, London, United Kingdom, April 24-26, 2018},
  pages     = {430--442},
  year      = {2018},
  crossref  = {DBLP:conf/eurosp/2018},
  url       = {https://doi.org/10.1109/EuroSP.2018.00037},
  doi       = {10.1109/EuroSP.2018.00037},
  timestamp = {Wed, 11 Jul 2018 11:39:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/CortierGT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-10412,
  author    = {Mihai Ordean and
               Mark Ryan and
               David Galindo},
  title     = {{CAOS:} Concurrent-Access Obfuscated Store},
  journal   = {CoRR},
  volume    = {abs/1709.10412},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.10412},
  archivePrefix = {arXiv},
  eprint    = {1709.10412},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1709-10412},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DagdelenGVAC16,
  author    = {{\"{O}}zg{\"{u}}r Dagdelen and
               David Galindo and
               Pascal V{\'{e}}ron and
               Sidi Mohamed El Yousfi Alaoui and
               Pierre{-}Louis Cayrel},
  title     = {Extended security arguments for signature schemes},
  journal   = {Des. Codes Cryptography},
  volume    = {78},
  number    = {2},
  pages     = {441--461},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10623-014-0009-7},
  doi       = {10.1007/s10623-014-0009-7},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/DagdelenGVAC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GalindoG0VV16,
  author    = {David Galindo and
               Johann Gro{\ss}sch{\"{a}}dl and
               Zhe Liu and
               Praveen Kumar Vadnala and
               Srinivas Vivek},
  title     = {Implementation of a leakage-resilient ElGamal key encapsulation mechanism},
  journal   = {J. Cryptographic Engineering},
  volume    = {6},
  number    = {3},
  pages     = {229--238},
  year      = {2016},
  url       = {https://doi.org/10.1007/s13389-016-0121-x},
  doi       = {10.1007/s13389-016-0121-x},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jce/GalindoG0VV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChaidosCFG16,
  author    = {Pyrros Chaidos and
               V{\'{e}}ronique Cortier and
               Georg Fuchsbauer and
               David Galindo},
  title     = {BeleniosRF: {A} Non-interactive Receipt-Free Electronic Voting Scheme},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1614--1625},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {http://doi.acm.org/10.1145/2976749.2978337},
  doi       = {10.1145/2976749.2978337},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChaidosCFG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CucurullGG16,
  author    = {Jordi Cucurull and
               Sandra Guasch and
               David Galindo},
  title     = {Transitioning to a Javascript Voting Client for Remote Online Voting},
  booktitle = {Proceedings of the 13th International Joint Conference on e-Business
               and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
               Portugal, July 26-28, 2016.},
  pages     = {121--132},
  year      = {2016},
  crossref  = {DBLP:conf/secrypt/2016},
  url       = {https://doi.org/10.5220/0005967301210132},
  doi       = {10.5220/0005967301210132},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/CucurullGG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CortierGKMT16,
  author    = {V{\'{e}}ronique Cortier and
               David Galindo and
               Ralf K{\"{u}}sters and
               Johannes M{\"{u}}ller and
               Tomasz Truderung},
  title     = {SoK: Verifiability Notions for E-Voting Protocols},
  booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
               USA, May 22-26, 2016},
  pages     = {779--798},
  year      = {2016},
  crossref  = {DBLP:conf/sp/2016},
  url       = {https://doi.org/10.1109/SP.2016.52},
  doi       = {10.1109/SP.2016.52},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/CortierGKMT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierGKMT16,
  author    = {V{\'{e}}ronique Cortier and
               David Galindo and
               Ralf K{\"{u}}sters and
               Johannes M{\"{u}}ller and
               Tomasz Truderung},
  title     = {Verifiability Notions for E-Voting Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {287},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/287},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CortierGKMT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/Galindo15,
  author    = {David Galindo},
  title     = {Compact hierarchical identity-based encryption based on a harder decisional
               problem},
  journal   = {Int. J. Comput. Math.},
  volume    = {92},
  number    = {3},
  pages     = {463--472},
  year      = {2015},
  url       = {https://doi.org/10.1080/00207160.2014.912278},
  doi       = {10.1080/00207160.2014.912278},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijcm/Galindo15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BernhardCGPW15,
  author    = {David Bernhard and
               V{\'{e}}ronique Cortier and
               David Galindo and
               Olivier Pereira and
               Bogdan Warinschi},
  title     = {SoK: {A} Comprehensive Analysis of Game-Based Ballot Privacy Definitions},
  booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  pages     = {499--516},
  year      = {2015},
  crossref  = {DBLP:conf/sp/2015},
  url       = {https://doi.org/10.1109/SP.2015.37},
  doi       = {10.1109/SP.2015.37},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/BernhardCGPW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/GalindoGP15,
  author    = {David Galindo and
               Sandra Guasch and
               Jordi Puiggali},
  title     = {2015 Neuch{\^{a}}tel's Cast-as-Intended Verification Mechanism},
  booktitle = {E-Voting and Identity - 5th International Conference, VoteID 2015,
               Bern, Switzerland, September 2-4, 2015, Proceedings},
  pages     = {3--18},
  year      = {2015},
  crossref  = {DBLP:conf/voteid/2015},
  url       = {https://doi.org/10.1007/978-3-319-22270-7\_1},
  doi       = {10.1007/978-3-319-22270-7\_1},
  timestamp = {Fri, 19 May 2017 01:26:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/voteid/GalindoGP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCGPW15,
  author    = {David Bernhard and
               V{\'{e}}ronique Cortier and
               David Galindo and
               Olivier Pereira and
               Bogdan Warinschi},
  title     = {A comprehensive analysis of game-based ballot privacy definitions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {255},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/255},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BernhardCGPW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierFG15,
  author    = {V{\'{e}}ronique Cortier and
               Georg Fuchsbauer and
               David Galindo},
  title     = {BeleniosRF: {A} Strongly Receipt-Free Electronic Voting Scheme},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {629},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/629},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CortierFG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GalindoV14,
  author    = {David Galindo and
               Srinivas Vivek},
  title     = {Limits of a conjecture on a leakage-resilient cryptosystem},
  journal   = {Inf. Process. Lett.},
  volume    = {114},
  number    = {4},
  pages     = {192--196},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.ipl.2013.11.014},
  doi       = {10.1016/j.ipl.2013.11.014},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/GalindoV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CortierGGI14,
  author    = {V{\'{e}}ronique Cortier and
               David Galindo and
               St{\'{e}}phane Glondu and
               Malika Izabach{\`{e}}ne},
  title     = {Election Verifiability for Helios under Weaker Trust Assumptions},
  booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {II}},
  pages     = {327--344},
  year      = {2014},
  crossref  = {DBLP:conf/esorics/2014-2},
  url       = {https://doi.org/10.1007/978-3-319-11212-1\_19},
  doi       = {10.1007/978-3-319-11212-1\_19},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/CortierGGI14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoGLVV14,
  author    = {David Galindo and
               Johann Gro{\ss}sch{\"{a}}dl and
               Zhe Liu and
               Praveen Kumar Vadnala and
               Srinivas Vivek},
  title     = {Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation
               Mechanism},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {835},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/835},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GalindoGLVV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Galindo13,
  author    = {David Galindo},
  title     = {A note on an {IND-CCA2} secure Paillier-based cryptosystem},
  journal   = {Inf. Process. Lett.},
  volume    = {113},
  number    = {22-24},
  pages     = {913--914},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.ipl.2013.09.008},
  doi       = {10.1016/j.ipl.2013.09.008},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/Galindo13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GalindoV13,
  author    = {David Galindo and
               Srinivas Vivek},
  title     = {A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature
               Scheme},
  booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
               2013, Oxford, UK, December 17-19, 2013. Proceedings},
  pages     = {173--192},
  year      = {2013},
  crossref  = {DBLP:conf/ima/2013},
  url       = {https://doi.org/10.1007/978-3-642-45239-0\_11},
  doi       = {10.1007/978-3-642-45239-0\_11},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/GalindoV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CortierGGI13,
  author    = {V{\'{e}}ronique Cortier and
               David Galindo and
               St{\'{e}}phane Glondu and
               Malika Izabach{\`{e}}ne},
  title     = {Distributed ElGamal {\`{a}} la Pedersen: Application to Helios},
  booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages     = {131--142},
  year      = {2013},
  crossref  = {DBLP:conf/wpes/2013},
  url       = {http://doi.acm.org/10.1145/2517840.2517852},
  doi       = {10.1145/2517840.2517852},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/CortierGGI13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierGGI13,
  author    = {V{\'{e}}ronique Cortier and
               David Galindo and
               St{\'{e}}phane Glondu and
               Malika Izabach{\`{e}}ne},
  title     = {A generic construction for voting correctness at minimum cost - Application
               to Helios},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {177},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/177},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CortierGGI13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/GalindoRL12,
  author    = {David Galindo and
               Rodrigo Roman and
               Javier L{\'{o}}pez},
  title     = {On the energy cost of authenticated key agreement in wireless sensor
               networks},
  journal   = {Wireless Communications and Mobile Computing},
  volume    = {12},
  number    = {1},
  pages     = {133--143},
  year      = {2012},
  url       = {https://doi.org/10.1002/wcm.894},
  doi       = {10.1002/wcm.894},
  timestamp = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/wicomm/GalindoRL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AlaouiDVGC12,
  author    = {Sidi Mohamed El Yousfi Alaoui and
               {\"{O}}zg{\"{u}}r Dagdelen and
               Pascal V{\'{e}}ron and
               David Galindo and
               Pierre{-}Louis Cayrel},
  title     = {Extended Security Arguments for Signature Schemes},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  pages     = {19--34},
  year      = {2012},
  crossref  = {DBLP:conf/africacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-31410-0\_2},
  doi       = {10.1007/978-3-642-31410-0\_2},
  timestamp = {Mon, 29 May 2017 13:41:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/AlaouiDVGC12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GalindoHV12,
  author    = {David Galindo and
               Javier Herranz and
               Jorge L. Villar},
  title     = {Identity-Based Encryption with Master Key-Dependent Message Security
               and Leakage-Resilience},
  booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
               in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  pages     = {627--642},
  year      = {2012},
  crossref  = {DBLP:conf/esorics/2012},
  url       = {https://doi.org/10.1007/978-3-642-33167-1\_36},
  doi       = {10.1007/978-3-642-33167-1\_36},
  timestamp = {Fri, 02 Jun 2017 20:48:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/GalindoHV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GalindoV12,
  author    = {David Galindo and
               Srinivas Vivek},
  title     = {A Practical Leakage-Resilient Signature Scheme in the Generic Group
               Model},
  booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  pages     = {50--65},
  year      = {2012},
  crossref  = {DBLP:conf/sacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-35999-6\_4},
  doi       = {10.1007/978-3-642-35999-6\_4},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/GalindoV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoHV12,
  author    = {David Galindo and
               Javier Herranz and
               Jorge Luis Villar},
  title     = {Identity-Based Encryption with Master Key-Dependent Message Security
               and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {142},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/142},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GalindoHV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/HoepmanG11,
  author    = {Jaap{-}Henk Hoepman and
               David Galindo},
  title     = {Non-interactive distributed encryption: a new primitive for revocable
               privacy},
  booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
               society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  pages     = {81--92},
  year      = {2011},
  crossref  = {DBLP:conf/wpes/2011},
  url       = {http://doi.acm.org/10.1145/2046556.2046567},
  doi       = {10.1145/2046556.2046567},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/HoepmanG11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/GalindoHK10,
  author    = {David Galindo and
               Javier Herranz and
               Eike Kiltz},
  title     = {On the generic construction of identity-based signatures with additional
               properties},
  journal   = {Adv. in Math. of Comm.},
  volume    = {4},
  number    = {4},
  pages     = {453--483},
  year      = {2010},
  url       = {https://doi.org/10.3934/amc.2010.4.453},
  doi       = {10.3934/amc.2010.4.453},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amco/GalindoHK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GalindoLFFLMS10,
  author    = {David Galindo and
               Beno{\^{\i}}t Libert and
               Marc Fischlin and
               Georg Fuchsbauer and
               Anja Lehmann and
               Mark Manulis and
               Dominique Schr{\"{o}}der},
  title     = {Public-Key Encryption with Non-Interactive Opening: New Constructions
               and Stronger Definitions},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  pages     = {333--350},
  year      = {2010},
  crossref  = {DBLP:conf/africacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9\_20},
  doi       = {10.1007/978-3-642-12678-9\_20},
  timestamp = {Mon, 25 Sep 2017 10:36:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/GalindoLFFLMS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/Galindo10,
  author    = {David Galindo},
  title     = {Chosen-Ciphertext Secure Identity-Based Encryption from Computational
               Bilinear Diffie-Hellman},
  booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
               Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  pages     = {367--376},
  year      = {2010},
  crossref  = {DBLP:conf/pairing/2010},
  url       = {https://doi.org/10.1007/978-3-642-17455-1\_23},
  doi       = {10.1007/978-3-642-17455-1\_23},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pairing/Galindo10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/KiltzG09,
  author    = {Eike Kiltz and
               David Galindo},
  title     = {Direct chosen-ciphertext secure identity-based key encapsulation without
               random oracles},
  journal   = {Theor. Comput. Sci.},
  volume    = {410},
  number    = {47-49},
  pages     = {5093--5111},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.tcs.2009.08.007},
  doi       = {10.1016/j.tcs.2009.08.007},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/KiltzG09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GalindoG09,
  author    = {David Galindo and
               Flavio D. Garcia},
  title     = {A Schnorr-Like Lightweight Identity-Based Signature Scheme},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
               Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
               2009. Proceedings},
  pages     = {135--148},
  year      = {2009},
  crossref  = {DBLP:conf/africacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-02384-2\_9},
  doi       = {10.1007/978-3-642-02384-2\_9},
  timestamp = {Mon, 29 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/GalindoG09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Galindo09,
  author    = {David Galindo},
  title     = {Breaking and Repairing Damg{\aa}rd et al. Public Key Encryption Scheme
               with Non-interactive Opening},
  booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
               the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
               Proceedings},
  pages     = {389--398},
  year      = {2009},
  crossref  = {DBLP:conf/ctrsa/2009},
  url       = {https://doi.org/10.1007/978-3-642-00862-7\_26},
  doi       = {10.1007/978-3-642-00862-7\_26},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/Galindo09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-0069,
  author    = {Pierre{-}Louis Cayrel and
               Philippe Gaborit and
               David Galindo and
               Marc Girault},
  title     = {Improved identity-based identification using correcting codes},
  journal   = {CoRR},
  volume    = {abs/0903.0069},
  year      = {2009},
  url       = {http://arxiv.org/abs/0903.0069},
  archivePrefix = {arXiv},
  eprint    = {0903.0069},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0903-0069},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GalindoH08,
  author    = {David Galindo and
               Javier Herranz},
  title     = {On the security of public key cryptosystems with a double decryption
               mechanism},
  journal   = {Inf. Process. Lett.},
  volume    = {108},
  number    = {5},
  pages     = {279--283},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.ipl.2008.05.017},
  doi       = {10.1016/j.ipl.2008.05.017},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/GalindoH08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/GalindoMR08,
  author    = {David Galindo and
               Paz Morillo and
               Carla R{\`{a}}fols},
  title     = {Improved certificate-based encryption in the standard model},
  journal   = {Journal of Systems and Software},
  volume    = {81},
  number    = {7},
  pages     = {1218--1226},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.jss.2007.09.009},
  doi       = {10.1016/j.jss.2007.09.009},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/GalindoMR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GalindoRL08,
  author    = {David Galindo and
               Rodrigo Roman and
               Javier L{\'{o}}pez},
  title     = {A Killer Application for Pairings: Authenticated Key Establishment
               in Underwater Wireless Sensor Networks},
  booktitle = {Cryptology and Network Security, 7th International Conference, {CANS}
               2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  pages     = {120--132},
  year      = {2008},
  crossref  = {DBLP:conf/cans/2008},
  url       = {https://doi.org/10.1007/978-3-540-89641-8\_9},
  doi       = {10.1007/978-3-540-89641-8\_9},
  timestamp = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cans/GalindoRL08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GalindoGR08,
  author    = {David Galindo and
               Flavio D. Garcia and
               Peter van Rossum},
  title     = {Computational Soundness of Non-Malleable Commitments},
  booktitle = {Information Security Practice and Experience, 4th International Conference,
               {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  pages     = {361--376},
  year      = {2008},
  crossref  = {DBLP:conf/ispec/2008},
  url       = {https://doi.org/10.1007/978-3-540-79104-1\_26},
  doi       = {10.1007/978-3-540-79104-1\_26},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/GalindoGR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaekGSZ08,
  author    = {Joonsang Baek and
               David Galindo and
               Willy Susilo and
               Jianying Zhou},
  title     = {Constructing Strong {KEM} from Weak {KEM} (or How to Revive the {KEM/DEM}
               Framework)},
  booktitle = {Security and Cryptography for Networks, 6th International Conference,
               {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  pages     = {358--374},
  year      = {2008},
  crossref  = {DBLP:conf/scn/2008},
  url       = {https://doi.org/10.1007/978-3-540-85855-3\_24},
  doi       = {10.1007/978-3-540-85855-3\_24},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/scn/BaekGSZ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KiltzG06,
  author    = {Eike Kiltz and
               David Galindo},
  title     = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without
               Random Oracles},
  booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
               2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  pages     = {336--347},
  year      = {2006},
  crossref  = {DBLP:conf/acisp/2006},
  url       = {https://doi.org/10.1007/11780656\_28},
  doi       = {10.1007/11780656\_28},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/KiltzG06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GalindoHK06,
  author    = {David Galindo and
               Javier Herranz and
               Eike Kiltz},
  title     = {On the Generic Construction of Identity-Based Signatures with Additional
               Properties},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  pages     = {178--193},
  year      = {2006},
  crossref  = {DBLP:conf/asiacrypt/2006},
  url       = {https://doi.org/10.1007/11935230\_12},
  doi       = {10.1007/11935230\_12},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/GalindoHK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/GalindoMR06,
  author    = {David Galindo and
               Paz Morillo and
               Carla R{\`{a}}fols},
  title     = {Breaking Yum and Lee Generic Constructions of Certificate-Less and
               Certificate-Based Encryption Schemes},
  booktitle = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and
               Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings},
  pages     = {81--91},
  year      = {2006},
  crossref  = {DBLP:conf/europki/2006},
  url       = {https://doi.org/10.1007/11774716\_7},
  doi       = {10.1007/11774716\_7},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/GalindoMR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GalindoH06,
  author    = {David Galindo and
               Javier Herranz},
  title     = {A Generic Construction for Token-Controlled Public Key Encryption},
  booktitle = {Financial Cryptography and Data Security, 10th International Conference,
               {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
               Revised Selected Papers},
  pages     = {177--190},
  year      = {2006},
  crossref  = {DBLP:conf/fc/2006},
  url       = {https://doi.org/10.1007/11889663\_16},
  doi       = {10.1007/11889663\_16},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/GalindoH06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/Galindo06,
  author    = {David Galindo},
  title     = {A Separation Between Selective and Full-Identity Security Notions
               for Identity-Based Encryption},
  booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International
               Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  pages     = {318--326},
  year      = {2006},
  crossref  = {DBLP:conf/iccsa/2006-3},
  url       = {https://doi.org/10.1007/11751595\_35},
  doi       = {10.1007/11751595\_35},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccsa/Galindo06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latin/AttrapadungCGHHIM0006,
  author    = {Nuttapong Attrapadung and
               Yang Cui and
               David Galindo and
               Goichiro Hanaoka and
               Ichiro Hasuo and
               Hideki Imai and
               Kanta Matsuura and
               Peng Yang and
               Rui Zhang},
  title     = {Relations Among Notions of Security for Identity Based Encryption
               Schemes},
  booktitle = {{LATIN} 2006: Theoretical Informatics, 7th Latin American Symposium,
               Valdivia, Chile, March 20-24, 2006, Proceedings},
  pages     = {130--141},
  year      = {2006},
  crossref  = {DBLP:conf/latin/2006},
  url       = {https://doi.org/10.1007/11682462\_16},
  doi       = {10.1007/11682462\_16},
  timestamp = {Sun, 04 Jun 2017 10:09:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/latin/AttrapadungCGHHIM0006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/CorinGH06,
  author    = {Ricardo Corin and
               David Galindo and
               Jaap{-}Henk Hoepman},
  title     = {Securing Data Accountability in Decentralized Systems},
  booktitle = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,
               {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
               COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}
               Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,
               France, October 29 - November 3, 2006. Proceedings, Part {I}},
  pages     = {626--635},
  year      = {2006},
  crossref  = {DBLP:conf/otm/2006-w1},
  url       = {https://doi.org/10.1007/11915034\_86},
  doi       = {10.1007/11915034\_86},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/otm/CorinGH06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GalindoK06,
  author    = {David Galindo and
               Eike Kiltz},
  title     = {Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation
               Without Random Oracles},
  booktitle = {Security and Cryptography for Networks, 5th International Conference,
               {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  pages     = {173--185},
  year      = {2006},
  crossref  = {DBLP:conf/scn/2006},
  url       = {https://doi.org/10.1007/11832072\_12},
  doi       = {10.1007/11832072\_12},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/GalindoK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzG06,
  author    = {Eike Kiltz and
               David Galindo},
  title     = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without
               Random Oracles},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {34},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/034},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KiltzG06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoHK06,
  author    = {David Galindo and
               Javier Herranz and
               Eike Kiltz},
  title     = {On the Generic Construction of Identity-Based Signatures with Additional
               Properties},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {296},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/296},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GalindoHK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GalindoMMV05,
  author    = {David Galindo and
               Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
               Paz Morillo and
               Jorge Luis Villar},
  title     = {Fujisaki-Okamoto hybrid encryption revisited},
  journal   = {Int. J. Inf. Sec.},
  volume    = {4},
  number    = {4},
  pages     = {228--241},
  year      = {2005},
  url       = {https://doi.org/10.1007/s10207-004-0042-z},
  doi       = {10.1007/s10207-004-0042-z},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/GalindoMMV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Galindo05,
  author    = {David Galindo},
  title     = {Boneh-Franklin Identity Based Encryption Revisited},
  booktitle = {Automata, Languages and Programming, 32nd International Colloquium,
               {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  pages     = {791--802},
  year      = {2005},
  crossref  = {DBLP:conf/icalp/2005},
  url       = {https://doi.org/10.1007/11523468\_64},
  doi       = {10.1007/11523468\_64},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/Galindo05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galindo05,
  author    = {David Galindo},
  title     = {Boneh-Franklin Identity Based Encryption Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {117},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/117},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Galindo05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoH05,
  author    = {David Galindo and
               Ichiro Hasuo},
  title     = {Security Notions for Identity Based Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {253},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/253},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GalindoH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GalindoMTV04,
  author    = {David Galindo and
               Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
               Tsuyoshi Takagi and
               Jorge Luis Villar},
  title     = {A Provably Secure Elliptic Curve Scheme with Fast Encryption},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
               on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  pages     = {245--259},
  year      = {2004},
  crossref  = {DBLP:conf/indocrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-30556-9\_20},
  doi       = {10.1007/978-3-540-30556-9\_20},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/GalindoMTV04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMV04,
  author    = {David Galindo and
               Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
               Jorge L. Villar},
  title     = {Evaluating elliptic curve based KEMs in the light of pairings},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {84},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/084},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GalindoMV04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GalindoMMV03,
  author    = {David Galindo and
               Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
               Paz Morillo and
               Jorge Luis Villar},
  title     = {Easy Verifiable Primitives and Practical Public Key Cryptosystems},
  booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
               UK, October 1-3, 2003, Proceedings},
  pages     = {69--83},
  year      = {2003},
  crossref  = {DBLP:conf/isw/2003},
  url       = {https://doi.org/10.1007/10958513\_6},
  doi       = {10.1007/10958513\_6},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/GalindoMMV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalindoMMV03,
  author    = {David Galindo and
               Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
               Paz Morillo and
               Jorge Luis Villar},
  title     = {A Practical Public Key Cryptosystem from Paillier and Rabin Schemes},
  booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
               Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
               6-8, 2003, Proceedings},
  pages     = {279--291},
  year      = {2003},
  crossref  = {DBLP:conf/pkc/2003},
  url       = {https://doi.org/10.1007/3-540-36288-6\_21},
  doi       = {10.1007/3-540-36288-6\_21},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/GalindoMMV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV03,
  author    = {David Galindo and
               Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
               Paz Morillo and
               Jorge L. Villar},
  title     = {Fujisaki-Okamoto {IND-CCA} hybrid encryption revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {107},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/107},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GalindoMMV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV02,
  author    = {David Galindo and
               Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
               Paz Morillo and
               Jorge L. Villar},
  title     = {An efficient semantically secure elliptic curve cryptosystem based
               on {KMOV}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {37},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/037},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GalindoMMV02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV02a,
  author    = {David Galindo and
               Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
               Paz Morillo and
               Jorge L. Villar},
  title     = {A semantically secure elliptic curve {RSA} scheme with small expansion
               factor},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {83},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/083},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GalindoMMV02a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2018,
  title     = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2018, London, United Kingdom, April 24-26, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8405665},
  isbn      = {978-1-5386-4228-3},
  timestamp = {Wed, 11 Jul 2018 11:39:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2016,
  editor    = {Christian Callegari and
               Marten van Sinderen and
               Panagiotis G. Sarigiannidis and
               Pierangela Samarati and
               Enrique Cabello and
               Pascal Lorenz and
               Mohammad S. Obaidat},
  title     = {Proceedings of the 13th International Joint Conference on e-Business
               and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
               Portugal, July 26-28, 2016},
  publisher = {SciTePress},
  year      = {2016},
  isbn      = {978-989-758-196-0},
  timestamp = {Tue, 13 Sep 2016 14:32:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2016,
  title     = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
               USA, May 22-26, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7528194},
  isbn      = {978-1-5090-0824-7},
  timestamp = {Tue, 20 Sep 2016 12:04:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2015,
  title     = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7160813},
  isbn      = {978-1-4673-6949-7},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2015,
  editor    = {Rolf Haenni and
               Reto E. Koenig and
               Douglas Wikstr{\"{o}}m},
  title     = {E-Voting and Identity - 5th International Conference, VoteID 2015,
               Bern, Switzerland, September 2-4, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9269},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-22270-7},
  doi       = {10.1007/978-3-319-22270-7},
  isbn      = {978-3-319-22269-1},
  timestamp = {Fri, 19 May 2017 01:26:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/voteid/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-2,
  editor    = {Miroslaw Kutylowski and
               Jaideep Vaidya},
  title     = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8713},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11212-1},
  doi       = {10.1007/978-3-319-11212-1},
  isbn      = {978-3-319-11211-4},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2014-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2013,
  editor    = {Martijn Stam},
  title     = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
               2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8308},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45239-0},
  doi       = {10.1007/978-3-642-45239-0},
  isbn      = {978-3-642-45238-3},
  timestamp = {Fri, 26 May 2017 00:49:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Sara Foresti},
  title     = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517840},
  isbn      = {978-1-4503-2485-4},
  timestamp = {Fri, 22 Nov 2013 19:47:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2012,
  editor    = {Aikaterini Mitrokotsa and
               Serge Vaudenay},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7374},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31410-0},
  doi       = {10.1007/978-3-642-31410-0},
  isbn      = {978-3-642-31409-4},
  timestamp = {Mon, 29 May 2017 13:41:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2012,
  editor    = {Sara Foresti and
               Moti Yung and
               Fabio Martinelli},
  title     = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
               in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7459},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33167-1},
  doi       = {10.1007/978-3-642-33167-1},
  isbn      = {978-3-642-33166-4},
  timestamp = {Fri, 02 Jun 2017 20:48:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2012,
  editor    = {Lars R. Knudsen and
               Huapeng Wu},
  title     = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7707},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-35999-6},
  doi       = {10.1007/978-3-642-35999-6},
  isbn      = {978-3-642-35998-9},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2011,
  editor    = {Yan Chen and
               Jaideep Vaidya},
  title     = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
               society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2046556},
  isbn      = {978-1-4503-1002-4},
  timestamp = {Sun, 15 Jul 2012 17:20:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2010,
  editor    = {Daniel J. Bernstein and
               Tanja Lange},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6055},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9},
  doi       = {10.1007/978-3-642-12678-9},
  isbn      = {978-3-642-12677-2},
  timestamp = {Mon, 25 Sep 2017 10:36:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2010,
  editor    = {Marc Joye and
               Atsuko Miyaji and
               Akira Otsuka},
  title     = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
               Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6487},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17455-1},
  doi       = {10.1007/978-3-642-17455-1},
  isbn      = {978-3-642-17454-4},
  timestamp = {Mon, 22 May 2017 17:11:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pairing/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2009,
  editor    = {Bart Preneel},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
               Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
               2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5580},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02384-2},
  doi       = {10.1007/978-3-642-02384-2},
  isbn      = {978-3-642-02383-5},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2009,
  editor    = {Marc Fischlin},
  title     = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
               the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5473},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00862-7},
  doi       = {10.1007/978-3-642-00862-7},
  isbn      = {978-3-642-00861-0},
  timestamp = {Sun, 21 May 2017 00:20:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2008,
  editor    = {Matthew K. Franklin and
               Lucas Chi Kwong Hui and
               Duncan S. Wong},
  title     = {Cryptology and Network Security, 7th International Conference, {CANS}
               2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5339},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89641-8},
  doi       = {10.1007/978-3-540-89641-8},
  isbn      = {978-3-540-89640-1},
  timestamp = {Tue, 13 Jun 2017 10:37:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2008,
  editor    = {Liqun Chen and
               Yi Mu and
               Willy Susilo},
  title     = {Information Security Practice and Experience, 4th International Conference,
               {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4991},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-79104-1},
  doi       = {10.1007/978-3-540-79104-1},
  isbn      = {978-3-540-79103-4},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2008,
  editor    = {Rafail Ostrovsky and
               Roberto De Prisco and
               Ivan Visconti},
  title     = {Security and Cryptography for Networks, 6th International Conference,
               {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5229},
  publisher = {Springer},
  year      = {2008},
  url       = {http://www.springerlink.com/content/978-3-540-85854-6/\#section=249631\&page=1},
  isbn      = {978-3-540-85854-6},
  timestamp = {Sun, 25 Sep 2011 11:07:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2006,
  editor    = {Lynn Margaret Batten and
               Reihaneh Safavi{-}Naini},
  title     = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
               2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4058},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11780656},
  doi       = {10.1007/11780656},
  isbn      = {3-540-35458-1},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2006,
  editor    = {Xuejia Lai and
               Kefei Chen},
  title     = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4284},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11935230},
  doi       = {10.1007/11935230},
  isbn      = {3-540-49475-8},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2006,
  editor    = {Andrea S. Atzeni and
               Antonio Lioy},
  title     = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and
               Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4043},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11774716},
  doi       = {10.1007/11774716},
  isbn      = {3-540-35151-5},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2006,
  editor    = {Giovanni Di Crescenzo and
               Aviel D. Rubin},
  title     = {Financial Cryptography and Data Security, 10th International Conference,
               {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
               Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4107},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11889663},
  doi       = {10.1007/11889663},
  isbn      = {3-540-46255-4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccsa/2006-3,
  editor    = {Marina L. Gavrilova and
               Osvaldo Gervasi and
               Vipin Kumar and
               Chih Jeng Kenneth Tan and
               David Taniar and
               Antonio Lagan{\`{a}} and
               Youngsong Mun and
               Hyunseung Choo},
  title     = {Computational Science and Its Applications - {ICCSA} 2006, International
               Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {3982},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11751595},
  doi       = {10.1007/11751595},
  isbn      = {3-540-34075-0},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccsa/2006-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latin/2006,
  editor    = {Jos{\'{e}} R. Correa and
               Alejandro Hevia and
               Marcos A. Kiwi},
  title     = {{LATIN} 2006: Theoretical Informatics, 7th Latin American Symposium,
               Valdivia, Chile, March 20-24, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3887},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11682462},
  doi       = {10.1007/11682462},
  isbn      = {3-540-32755-X},
  timestamp = {Sun, 04 Jun 2017 10:09:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/latin/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/otm/2006-w1,
  editor    = {Robert Meersman and
               Zahir Tari and
               Pilar Herrero},
  title     = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,
               {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
               COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}
               Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,
               France, October 29 - November 3, 2006. Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {4277},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11915034},
  doi       = {10.1007/11915034},
  isbn      = {3-540-48269-5},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/otm/2006-w1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2006,
  editor    = {Roberto De Prisco and
               Moti Yung},
  title     = {Security and Cryptography for Networks, 5th International Conference,
               {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4116},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11832072},
  doi       = {10.1007/11832072},
  isbn      = {3-540-38080-9},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2005,
  editor    = {Lu{\'{\i}}s Caires and
               Giuseppe F. Italiano and
               Lu{\'{\i}}s Monteiro and
               Catuscia Palamidessi and
               Moti Yung},
  title     = {Automata, Languages and Programming, 32nd International Colloquium,
               {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3580},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11523468},
  doi       = {10.1007/11523468},
  isbn      = {3-540-27580-0},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2004,
  editor    = {Anne Canteaut and
               Kapalee Viswanathan},
  title     = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
               on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3348},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b104579},
  doi       = {10.1007/b104579},
  isbn      = {3-540-24130-2},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2003,
  editor    = {Colin Boyd and
               Wenbo Mao},
  title     = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
               UK, October 1-3, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2851},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13828},
  doi       = {10.1007/b13828},
  isbn      = {3-540-20176-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2003,
  editor    = {Yvo Desmedt},
  title     = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
               Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
               6-8, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2567},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36288-6},
  doi       = {10.1007/3-540-36288-6},
  isbn      = {3-540-00324-X},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier