default search action
BibTeX records: Mats Näslund
@article{DBLP:journals/iacr/MaximovN23, author = {Alexander Maximov and Mats N{\"{a}}slund}, title = {Security analysis of the Milenage-construction based on a {PRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2023}, url = {https://eprint.iacr.org/2023/607}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaximovN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ArfaouiBBBEFKNN18, author = {Ghada Arfaoui and Pascal Bisson and Rolf Blom and Ravishankar Borgaonkar and H{\aa}kan Englund and Edith Felix and Felix Klaedtke and Prajwol Kumar Nakarmi and Mats N{\"{a}}slund and Piers O'Hanlon and Juri Papay and Jani Suomalainen and Mike Surridge and Jean{-}Philippe Wary and Alexander Zahariev}, title = {A Security Architecture for 5G Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {22466--22479}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2827419}, doi = {10.1109/ACCESS.2018.2827419}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ArfaouiBBBEFKNN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DubrovaNSL18, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Fredrik Lindqvist}, title = {Message Authentication Based on Cryptographically Secure {CRC} without Polynomial Irreducibility Test}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {383--399}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0227-8}, doi = {10.1007/S12095-017-0227-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DubrovaNSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/norchip/YuDNT18, author = {Yang Yu and Elena Dubrova and Mats N{\"{a}}slund and Sha Tao}, editor = {Jari Nurmi and Peeter Ellervee and Juri Mihhailov and Maksim Jenihhin and Kalle Tammem{\"{a}}e}, title = {On Designing PUF-Based TRNGs with Known Answer Tests}, booktitle = {2018 {IEEE} Nordic Circuits and Systems Conference, {NORCAS} 2018: {NORCHIP} and International Symposium of System-on-Chip (SoC), Tallinn, Estonia, October 30-31, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NORCHIP.2018.8573460}, doi = {10.1109/NORCHIP.2018.8573460}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/norchip/YuDNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/norchip/YuDNT18a, author = {Yang Yu and Elena Dubrova and Mats N{\"{a}}slund and Sha Tao}, editor = {Jari Nurmi and Peeter Ellervee and Juri Mihhailov and Maksim Jenihhin and Kalle Tammem{\"{a}}e}, title = {On Designing PUF-Based TRNGs with Known Answer Tests}, booktitle = {2018 {IEEE} Nordic Circuits and Systems Conference, {NORCAS} 2018: {NORCHIP} and International Symposium of System-on-Chip (SoC), Tallinn, Estonia, October 30-31, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NORCHIP.2018.8573489}, doi = {10.1109/NORCHIP.2018.8573489}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/norchip/YuDNT18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DubrovaNSL18, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Fredrik Lindqvist}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Lightweight Message Authentication for Constrained Devices}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {196--201}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212482}, doi = {10.1145/3212480.3212482}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/DubrovaNSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/DubrovaNCFS17, author = {Elena Dubrova and Mats N{\"{a}}slund and Gunnar Carlsson and John Fornehed and Ben J. M. Smeets}, title = {Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of {BIST}}, journal = {J. Signal Process. Syst.}, volume = {87}, number = {3}, pages = {371--381}, year = {2017}, url = {https://doi.org/10.1007/s11265-016-1127-4}, doi = {10.1007/S11265-016-1127-4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vlsisp/DubrovaNCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mownet/JimenezNNN17, author = {Enrique Cobo Jimenez and Prajwol Kumar Nakarmi and Mats N{\"{a}}slund and Karl Norrman}, title = {Subscription identifier privacy in 5G systems}, booktitle = {International Conference on Selected Topics in Mobile and Wireless Networking, MoWNeT 2017, Avignon, France, May 17-19, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/MoWNet.2017.8045947}, doi = {10.1109/MOWNET.2017.8045947}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mownet/JimenezNNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/BaumannNGST16, author = {Christoph Baumann and Mats N{\"{a}}slund and Christian Gehrmann and Oliver Schwarz and Hans Thorsen}, title = {A high assurance virtualization platform for ARMv8}, booktitle = {European Conference on Networks and Communications, EuCNC 2016, Athens, Greece, June 27-30, 2016}, pages = {210--214}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuCNC.2016.7561034}, doi = {10.1109/EUCNC.2016.7561034}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/BaumannNGST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobimedia/DubrovaNSN16, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Karl Norrman}, editor = {Zheng Yan and Honggang Wang}, title = {Error-Correcting Message Authentication for 5G}, booktitle = {Proceedings of the 9th {EAI} International Conference on Mobile Multimedia Communications, MobiMedia 2016, Xi'an, China, June 18-20, 2016}, pages = {149--158}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=3021414}, timestamp = {Thu, 19 Oct 2017 12:55:22 +0200}, biburl = {https://dblp.org/rec/conf/mobimedia/DubrovaNSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobimedia/NorrmanND16, author = {Karl Norrman and Mats N{\"{a}}slund and Elena Dubrova}, editor = {Zheng Yan and Honggang Wang}, title = {Protecting {IMSI} and User Privacy in 5G Networks}, booktitle = {Proceedings of the 9th {EAI} International Conference on Mobile Multimedia Communications, MobiMedia 2016, Xi'an, China, June 18-20, 2016}, pages = {159--166}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=3021415}, timestamp = {Wed, 13 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobimedia/NorrmanND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/SimplicioIBCN15, author = {Marcos A. Simpl{\'{\i}}cio Jr. and Leonardo H. Iwaya and Bruno M. Barros and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund}, title = {SecourHealth: {A} Delay-Tolerant Security Framework for Mobile Health Data Collection}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {19}, number = {2}, pages = {761--772}, year = {2015}, url = {https://doi.org/10.1109/JBHI.2014.2320444}, doi = {10.1109/JBHI.2014.2320444}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/SimplicioIBCN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/BarrosISCMN15, author = {Bruno M. Barros and Leonardo H. Iwaya and Marcos A. Simpl{\'{\i}}cio Jr. and Tereza Cristina M. B. Carvalho and Andr{\'{a}}s M{\'{e}}hes and Mats N{\"{a}}slund}, editor = {Markus Helfert and Donald Ferguson and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz}, title = {Classifying Security Threats in Cloud Networking}, booktitle = {{CLOSER} 2015 - Proceedings of the 5th International Conference on Cloud Computing and Services Science, Lisbon, Portugal, 20-22 May, 2015}, pages = {214--220}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005489402140220}, doi = {10.5220/0005489402140220}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/BarrosISCMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/NaslundDSL15, author = {Mats N{\"{a}}slund and Elena Dubrova and G{\"{o}}ran Selander and Fredrik Lindqvist}, title = {A random access procedure based on tunable puzzles}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {533--540}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346866}, doi = {10.1109/CNS.2015.7346866}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/NaslundDSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DubrovaNS15, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander}, title = {CRC-Based Message Authentication for 5G Mobile Technology}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1186--1191}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.503}, doi = {10.1109/TRUSTCOM.2015.503}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DubrovaNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ArkkoNNS15, author = {Jari Arkko and Karl Norrman and Mats N{\"{a}}slund and Bengt Sahlin}, title = {A {USIM} Compatible 5G {AKA} Protocol with Perfect Forward Secrecy}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1205--1209}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.506}, doi = {10.1109/TRUSTCOM.2015.506}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ArkkoNNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DubrovaNCFS15, author = {Elena Dubrova and Mats N{\"{a}}slund and Gunnar Carlsson and John Fornehed and Ben J. M. Smeets}, title = {Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of {BIST}}, journal = {CoRR}, volume = {abs/1511.07792}, year = {2015}, url = {http://arxiv.org/abs/1511.07792}, eprinttype = {arXiv}, eprint = {1511.07792}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DubrovaNCFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DubrovaNSL15, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Fredrik Lindqvist}, title = {Cryptographically Secure {CRC} for Lightweight Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2015}, url = {http://eprint.iacr.org/2015/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DubrovaNSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DubrovaNCFS15, author = {Elena Dubrova and Mats N{\"{a}}slund and Gunnar Carlsson and John Fornehed and Ben J. M. Smeets}, title = {Remotely Managed Logic Built-In Self-Test for Secure {M2M} Communications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2015}, url = {http://eprint.iacr.org/2015/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DubrovaNCFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DubrovaNSL15a, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Fredrik Lindqvist}, title = {Lightweight CRC-based Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1138}, year = {2015}, url = {http://eprint.iacr.org/2015/1138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DubrovaNSL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/DubrovaNS14, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander}, editor = {Giorgio Di Natale}, title = {Secure and efficient {LBIST} for feedback shift register-based cryptographic systems}, booktitle = {19th {IEEE} European Test Symposium, {ETS} 2014, Paderborn, Germany, May 26-30, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ETS.2014.6847821}, doi = {10.1109/ETS.2014.6847821}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/ets/DubrovaNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issoc/DubrovaNCS14, author = {Elena Dubrova and Mats N{\"{a}}slund and Gunnar Carlsson and Ben J. M. Smeets}, editor = {Jari Nurmi and Peeter Ellervee and Dragomir Milojevic and Ondrej Daniel and Tommi Paakki}, title = {Keyed logic {BIST} for Trojan detection in SoC}, booktitle = {2014 International Symposium on System-on-Chip, SoC 2014, Tampere, Finland, October 28-29, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSOC.2014.6972433}, doi = {10.1109/ISSOC.2014.6972433}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/issoc/DubrovaNCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/norchip/DubrovaNST14, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Vlasios Tsiatsis}, title = {Energy-efficient message authentication for {IEEE} 802.15.4-based wireless sensor networks}, booktitle = {2014 NORCHIP, Tampere, Finland, October 27-28, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NORCHIP.2014.7004700}, doi = {10.1109/NORCHIP.2014.7004700}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/norchip/DubrovaNST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/SimplicioOMBCN13, author = {Marcos A. Simpl{\'{\i}}cio Jr. and Bruno Trevizan de Oliveira and C{\'{\i}}ntia B. Margi and Paulo S. L. M. Barreto and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund}, title = {Survey and comparison of message authentication solutions on wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {11}, number = {3}, pages = {1221--1236}, year = {2013}, url = {https://doi.org/10.1016/j.adhoc.2012.08.011}, doi = {10.1016/J.ADHOC.2012.08.011}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/SimplicioOMBCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/IwayaGSCDSRGNH13, author = {Leonardo H. Iwaya and Marco A. L. Gomes and Marcos A. Simpl{\'{\i}}cio Jr. and Tereza Cristina Melo de Brito Carvalho and Cristina K. Dominicini and Rony R. M. Sakuragui and Marina S. Rebelo and Marco A. Gutierrez and Mats N{\"{a}}slund and P. H{\aa}kansson}, title = {Mobile health in emerging countries: {A} survey of research initiatives in Brazil}, journal = {Int. J. Medical Informatics}, volume = {82}, number = {5}, pages = {283--298}, year = {2013}, url = {https://doi.org/10.1016/j.ijmedinf.2013.01.003}, doi = {10.1016/J.IJMEDINF.2013.01.003}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmi/IwayaGSCDSRGNH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GonzalezRSRCMNA13, author = {Nelson Mimura Gonzalez and Marco Antonio Torrez Rojas and Marcos Vinicius Maciel da Silva and Fernando F. Red{\'{\i}}golo and Tereza Cristina Melo de Brito Carvalho and Charles Christian Miers and Mats N{\"{a}}slund and Abu Shohel Ahmed}, title = {A Framework for Authentication and Authorization Credentials in Cloud Computing}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {509--516}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.63}, doi = {10.1109/TRUSTCOM.2013.63}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GonzalezRSRCMNA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/GonzalezMRSCNP12, author = {Nelson M. Gonzalez and Charles Miers and Fernando F. Red{\'{\i}}golo and Marcos A. Simpl{\'{\i}}cio Jr. and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund and Makan Pourzandi}, title = {A quantitative analysis of current security concerns and solutions for cloud computing}, journal = {J. Cloud Comput.}, volume = {1}, pages = {11}, year = {2012}, url = {https://doi.org/10.1186/2192-113X-1-11}, doi = {10.1186/2192-113X-1-11}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/GonzalezMRSCNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccoms/ChengNSF12, author = {Yi Cheng and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Eva Fogelstrom}, title = {Privacy in machine-to-machine communications {A} state-of-the-art survey}, booktitle = {{IEEE} International Conference on Communication Systems, {ICCS} 2012, Singapore, November 21-23, 2012}, pages = {75--79}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCS.2012.6406112}, doi = {10.1109/ICCS.2012.6406112}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/iccoms/ChengNSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/GonzalezMRSCNP11, author = {Nelson M. Gonzalez and Charles Miers and Fernando F. Red{\'{\i}}golo and Marcos A. Simpl{\'{\i}}cio Jr. and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Frank Leymann and Ivan I. Ivanov and Marten van Sinderen and Boris Shishkov}, title = {A Taxonomy Model for Cloud Computing Services}, booktitle = {{CLOSER} 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, Netherlands, 7-9 May, 2011}, pages = {56--65}, publisher = {SciTePress}, year = {2011}, timestamp = {Mon, 26 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/GonzalezMRSCNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/GonzalezMRCSNP11, author = {Nelson M. Gonzalez and Charles Miers and Fernando F. Red{\'{\i}}golo and Tereza Cristina M. B. Carvalho and Marcos A. Simpl{\'{\i}}cio Jr. and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Costas Lambrinoudakis and Panagiotis Rizomiliotis and Tomasz Wiktor Wlodarczyk}, title = {A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing}, booktitle = {{IEEE} 3rd International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29 - December 1, 2011}, pages = {231--238}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CloudCom.2011.39}, doi = {10.1109/CLOUDCOM.2011.39}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/GonzalezMRCSNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/SimplicioOBMCN11, author = {Marcos A. Simpl{\'{\i}}cio Jr. and Bruno Trevizan de Oliveira and Paulo S. L. M. Barreto and C{\'{\i}}ntia B. Margi and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund}, editor = {Chun Tung Chou and Tom Pfeifer and Anura P. Jayasumana}, title = {Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks}, booktitle = {{IEEE} 36th Conference on Local Computer Networks, {LCN} 2011, Bonn, Germany, October 4-7, 2011}, pages = {450--457}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/LCN.2011.6115506}, doi = {10.1109/LCN.2011.6115506}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/SimplicioOBMCN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/MargiOSSBCNG10, author = {C{\'{\i}}ntia B. Margi and Bruno Trevizan de Oliveira and Gustavo T. de Sousa and Marcos A. Simpl{\'{\i}}cio Jr. and Paulo S. L. M. Barreto and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund and Richard Gold}, title = {Impact of Operating Systems on Wireless Sensor Networks (Security) Applications and Testbeds}, booktitle = {Proceedings of the 19th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2010, Z{\"{u}}rich, Switzerland, August 2-5, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICCCN.2010.5560028}, doi = {10.1109/ICCCN.2010.5560028}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/MargiOSSBCNG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SimplicioCVCNP09, author = {Marcos A. Simpl{\'{\i}}cio Jr. and Vlad Coroama and Yeda Regina Venturini and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Irfan Awan and Muhammad Younas and Takahiro Hara and Arjan Durresi}, title = {{PHD}}, booktitle = {The {IEEE} 23rd International Conference on Advanced Information Networking and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29, 2009}, pages = {487--494}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/AINA.2009.18}, doi = {10.1109/AINA.2009.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SimplicioCVCNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HastadN08, author = {Johan H{\aa}stad and Mats N{\"{a}}slund}, title = {Practical Construction and Analysis of Pseudo-Randomness Primitives}, journal = {J. Cryptol.}, volume = {21}, number = {1}, pages = {1--26}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9009-3}, doi = {10.1007/S00145-007-9009-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HastadN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SimplicioBCMN08, author = {Marcos A. Simpl{\'{\i}}cio Jr. and Paulo S. L. M. Barreto and Tereza Cristina M. B. Carvalho and C{\'{\i}}ntia B. Margi and Mats N{\"{a}}slund}, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {The {CURUPIRA-2} Block Cipher for Constrained Platforms: Specification and Benchmarking}, booktitle = {Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {397}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-397/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:59 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SimplicioBCMN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medhocnet/VenturiniCCNP08, author = {Yeda Regina Venturini and Vlad Coroama and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Pedro Cuenca and Carlos Guerrero and Ram{\'{o}}n Puigjaner and Bartomeu Serra}, title = {Security for Context-Aware ad-hoc Networking Applications}, booktitle = {Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008}, series = {{IFIP}}, volume = {265}, pages = {145--156}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09490-8\_13}, doi = {10.1007/978-0-387-09490-8\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/medhocnet/VenturiniCCNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4771, author = {Vesa Lehtovirta and Mats N{\"{a}}slund and Karl Norrman}, title = {Integrity Transform Carrying Roll-Over Counter for the Secure Real-time Transport Protocol {(SRTP)}}, journal = {{RFC}}, volume = {4771}, pages = {1--12}, year = {2007}, url = {https://doi.org/10.17487/RFC4771}, doi = {10.17487/RFC4771}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4771.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/MatushimaVSCRNP06, author = {Reinaldo Matushima and Yeda Regina Venturini and Rony R. M. Sakuragui and Tereza Cristina M. B. Carvalho and Wilson Vicente Ruggiero and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Seizo Onoe and Mohsen Guizani and Hsiao{-}Hwa Chen and Mamoru Sawahashi}, title = {Multiple personal security domains}, booktitle = {Proceedings of the International Conference on Wireless Communications and Mobile Computing, {IWCMC} 2006, Vancouver, British Columbia, Canada, July 3-6, 2006}, pages = {361--366}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143549.1143621}, doi = {10.1145/1143549.1143621}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwcmc/MatushimaVSCRNP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4567, author = {Jari Arkko and Fredrik Lindholm and Mats N{\"{a}}slund and Karl Norrman and Elisabetta Carrara}, title = {Key Management Extensions for Session Description Protocol {(SDP)} and Real Time Streaming Protocol {(RTSP)}}, journal = {{RFC}}, volume = {4567}, pages = {1--30}, year = {2006}, url = {https://doi.org/10.17487/RFC4567}, doi = {10.17487/RFC4567}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4567.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ArkkoNN05, author = {Jari Arkko and Pekka Nikander and Mats N{\"{a}}slund}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Enhancing Privacy with Shared Pseudo Random Sequences}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {187--196}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_22}, doi = {10.1007/978-3-540-77156-2\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/ArkkoNN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4169, author = {Vesa Torvinen and Jari Arkko and Mats N{\"{a}}slund}, title = {Hypertext Transfer Protocol {(HTTP)} Digest Authentication Using Authentication and Key Agreement {(AKA)} Version-2}, journal = {{RFC}}, volume = {4169}, pages = {1--13}, year = {2005}, url = {https://doi.org/10.17487/RFC4169}, doi = {10.17487/RFC4169}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4169.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/HastadN04, author = {Johan H{\aa}stad and Mats N{\"{a}}slund}, title = {The security of all {RSA} and discrete log bits}, journal = {J. {ACM}}, volume = {51}, number = {2}, pages = {187--230}, year = {2004}, url = {https://doi.org/10.1145/972639.972642}, doi = {10.1145/972639.972642}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/HastadN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/VascoNS04, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Mats N{\"{a}}slund and Igor E. Shparlinski}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {New Results on the Hardness of Diffie-Hellman Bits}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {159--172}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_12}, doi = {10.1007/978-3-540-24632-9\_12}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/VascoNS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3711, author = {Mark Baugher and David A. McGrew and Mats N{\"{a}}slund and Elisabetta Carrara and Karl Norrman}, title = {The Secure Real-time Transport Protocol {(SRTP)}}, journal = {{RFC}}, volume = {3711}, pages = {1--56}, year = {2004}, url = {https://doi.org/10.17487/RFC3711}, doi = {10.17487/RFC3711}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3711.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3830, author = {Jari Arkko and Elisabetta Carrara and Fredrik Lindholm and Mats N{\"{a}}slund and Karl Norrman}, title = {{MIKEY:} Multimedia Internet KEYing}, journal = {{RFC}}, volume = {3830}, pages = {1--66}, year = {2004}, url = {https://doi.org/10.17487/RFC3830}, doi = {10.17487/RFC3830}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3830.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NaslundSW03, author = {Mats N{\"{a}}slund and Igor E. Shparlinski and William Whyte}, editor = {Yvo Desmedt}, title = {On the Bit Security of NTRUEncrypt}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {62--70}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_5}, doi = {10.1007/3-540-36288-6\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NaslundSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiNS02, author = {Wen{-}Ching W. Li and Mats N{\"{a}}slund and Igor E. Shparlinski}, editor = {Moti Yung}, title = {Hidden Number Problem with the Trace and Bit Security of {XTR} and {LUC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {433--448}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_28}, doi = {10.1007/3-540-45708-9\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiNS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latin/VascoNS02, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Mats N{\"{a}}slund and Igor E. Shparlinski}, editor = {Sergio Rajsbaum}, title = {The Hidden Number Problem in Extension Fields and Its Applications}, booktitle = {{LATIN} 2002: Theoretical Informatics, 5th Latin American Symposium, Cancun, Mexico, April 3-6, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2286}, pages = {105--117}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45995-2\_14}, doi = {10.1007/3-540-45995-2\_14}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latin/VascoNS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwcn/BlomCLNN02, author = {Rolf Blom and Elisabetta Carrara and Fredrik Lindholm and Karl Norrman and Mats N{\"{a}}slund}, title = {Conversational {IP} multimedia security}, booktitle = {Proceedings of The Fourth {IEEE} Conference on Mobile and Wireless Communications Networks, {MWCN} 2002, September 9-11, 2002, Stockholm, Sweden}, pages = {147--151}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/MWCN.2002.1045712}, doi = {10.1109/MWCN.2002.1045712}, timestamp = {Wed, 16 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwcn/BlomCLNN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GoldmannNR01, author = {Mikael Goldmann and Mats N{\"{a}}slund and Alexander Russell}, title = {Complexity Bounds on General Hard-Core Predicates}, journal = {J. Cryptol.}, volume = {14}, number = {3}, pages = {177--195}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0007-6}, doi = {10.1007/S00145-001-0007-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/GoldmannNR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HastadN01, author = {Johan H{\aa}stad and Mats N{\"{a}}slund}, editor = {Colin Boyd}, title = {Practical Construction and Analysis of Pseudo-Randomness Primitives}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {442--459}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_26}, doi = {10.1007/3-540-45682-1\_26}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HastadN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/NaslundR00, author = {Mats N{\"{a}}slund and Alexander Russell}, title = {Extraction of optimally unbiased bits from a biased source}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {3}, pages = {1093--1103}, year = {2000}, url = {https://doi.org/10.1109/18.841191}, doi = {10.1109/18.841191}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/NaslundR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/arscom/Naslund99, author = {Mats N{\"{a}}slund}, title = {On Steiner Triple Systems and Perfect Codes}, journal = {Ars Comb.}, volume = {53}, year = {1999}, timestamp = {Tue, 06 Jan 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/arscom/Naslund99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR99-037, author = {Johan H{\aa}stad and Mats N{\"{a}}slund}, title = {The Security of all {RSA} and Discrete Log Bits}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR99-037}}, year = {1999}, url = {https://eccc.weizmann.ac.il/eccc-reports/1999/TR99-037/index.html}, eprinttype = {ECCC}, eprint = {TR99-037}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR99-037.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HastadN99, author = {Johan H{\aa}stad and Mats N{\"{a}}slund}, title = {Security of all {RSA} and Discrete Log Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {1999}, url = {http://eprint.iacr.org/1999/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HastadN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/HastadN98, author = {Johan H{\aa}stad and Mats N{\"{a}}slund}, title = {The Security of Individual {RSA} Bits}, booktitle = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98, November 8-11, 1998, Palo Alto, California, {USA}}, pages = {510--521}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/SFCS.1998.743502}, doi = {10.1109/SFCS.1998.743502}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/HastadN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldmannN97, author = {Mikael Goldmann and Mats N{\"{a}}slund}, editor = {Burton S. Kaliski Jr.}, title = {The Complexity of Computing Hard Core Predicates}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {1--15}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052224}, doi = {10.1007/BFB0052224}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldmannN97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Naslund96, author = {Mats N{\"{a}}slund}, editor = {Neal Koblitz}, title = {All Bits ax+b mod p are Hard (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {114--128}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_10}, doi = {10.1007/3-540-68697-5\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Naslund96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Naslund95, author = {Mats N{\"{a}}slund}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {Universal Hash Functions {\&} Hard Core Bits}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {356--366}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_29}, doi = {10.1007/3-540-49264-X\_29}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Naslund95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.