BibTeX records: Krzysztof Pietrzak

download as .bib file

@inproceedings{DBLP:conf/innovations/Pietrzak19,
  author    = {Krzysztof Pietrzak},
  title     = {Proofs of Catalytic Space},
  booktitle = {10th Innovations in Theoretical Computer Science Conference, {ITCS}
               2019, January 10-12, 2019, San Diego, California, {USA}},
  pages     = {59:1--59:25},
  year      = {2019},
  crossref  = {DBLP:conf/innovations/2019},
  url       = {https://doi.org/10.4230/LIPIcs.ITCS.2019.59},
  doi       = {10.4230/LIPIcs.ITCS.2019.59},
  timestamp = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/Pietrzak19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Pietrzak19a,
  author    = {Krzysztof Pietrzak},
  title     = {Simple Verifiable Delay Functions},
  booktitle = {10th Innovations in Theoretical Computer Science Conference, {ITCS}
               2019, January 10-12, 2019, San Diego, California, {USA}},
  pages     = {60:1--60:15},
  year      = {2019},
  crossref  = {DBLP:conf/innovations/2019},
  url       = {https://doi.org/10.4230/LIPIcs.ITCS.2019.60},
  doi       = {10.4230/LIPIcs.ITCS.2019.60},
  timestamp = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/Pietrzak19a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/DziembowskiPW18,
  author    = {Stefan Dziembowski and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Non-Malleable Codes},
  journal   = {J. {ACM}},
  volume    = {65},
  number    = {4},
  pages     = {20:1--20:32},
  year      = {2018},
  url       = {https://doi.org/10.1145/3178432},
  doi       = {10.1145/3178432},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jacm/DziembowskiPW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlwenGKKOPRRR18,
  author    = {Jo{\"{e}}l Alwen and
               Peter Gazi and
               Chethan Kamath and
               Karen Klein and
               Georg Osang and
               Krzysztof Pietrzak and
               Leonid Reyzin and
               Michal Rolinek and
               Michal Ryb{\'{a}}r},
  title     = {On the Memory-Hardness of Data-Independent Password-Hashing Functions},
  booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications
               Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages     = {51--65},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018asia},
  url       = {https://doi.org/10.1145/3196494.3196534},
  doi       = {10.1145/3196494.3196534},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AlwenGKKOPRRR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenBP18,
  author    = {Jo{\"{e}}l Alwen and
               Jeremiah Blocki and
               Krzysztof Pietrzak},
  title     = {Sustained Space Complexity},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  pages     = {99--130},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-78375-8\_4},
  doi       = {10.1007/978-3-319-78375-8\_4},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/AlwenBP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CohenP18,
  author    = {Bram Cohen and
               Krzysztof Pietrzak},
  title     = {Simple Proofs of Sequential Work},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  pages     = {451--467},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-78375-8\_15},
  doi       = {10.1007/978-3-319-78375-8\_15},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CohenP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenBP18,
  author    = {Jo{\"{e}}l Alwen and
               Jeremiah Blocki and
               Krzysztof Pietrzak},
  title     = {Sustained Space Complexity},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {147},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/147},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlwenBP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenP18,
  author    = {Bram Cohen and
               Krzysztof Pietrzak},
  title     = {Simple Proofs of Sequential Work},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {183},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/183},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CohenP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak18,
  author    = {Krzysztof Pietrzak},
  title     = {Proofs of Catalytic Space},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {194},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/194},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Pietrzak18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerKKP18,
  author    = {Georg Fuchsbauer and
               Chethan Kamath and
               Karen Klein and
               Krzysztof Pietrzak},
  title     = {Adaptively Secure Proxy Re-encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {426},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/426},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FuchsbauerKKP18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak18a,
  author    = {Krzysztof Pietrzak},
  title     = {Simple Verifiable Delay Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {627},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/627},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Pietrzak18a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KiltzPVCJ17,
  author    = {Eike Kiltz and
               Krzysztof Pietrzak and
               Daniele Venturi and
               David Cash and
               Abhishek Jain},
  title     = {Efficient Authentication from Hard Learning Problems},
  journal   = {J. Cryptology},
  volume    = {30},
  number    = {4},
  pages     = {1238--1275},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00145-016-9247-3},
  doi       = {10.1007/s00145-016-9247-3},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/joc/KiltzPVCJ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbusalahACKPR17,
  author    = {Hamza Abusalah and
               Jo{\"{e}}l Alwen and
               Bram Cohen and
               Danylo Khilko and
               Krzysztof Pietrzak and
               Leonid Reyzin},
  title     = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs
               of Space},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  pages     = {357--379},
  year      = {2017},
  crossref  = {DBLP:conf/asiacrypt/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-70697-9\_13},
  doi       = {10.1007/978-3-319-70697-9\_13},
  timestamp = {Wed, 22 Nov 2017 13:46:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/AbusalahACKPR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JafargholiKKKPW17,
  author    = {Zahra Jafargholi and
               Chethan Kamath and
               Karen Klein and
               Ilan Komargodski and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Be Adaptive, Avoid Overcommitting},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {I}},
  pages     = {133--163},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-63688-7\_5},
  doi       = {10.1007/978-3-319-63688-7\_5},
  timestamp = {Mon, 14 Aug 2017 14:32:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/JafargholiKKKPW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenBP17,
  author    = {Jo{\"{e}}l Alwen and
               Jeremiah Blocki and
               Krzysztof Pietrzak},
  title     = {Depth-Robust Graphs and Their Cumulative Memory Complexity},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  pages     = {3--32},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-3},
  url       = {https://doi.org/10.1007/978-3-319-56617-7\_1},
  doi       = {10.1007/978-3-319-56617-7\_1},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/AlwenBP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenCPRT17,
  author    = {Jo{\"{e}}l Alwen and
               Binyi Chen and
               Krzysztof Pietrzak and
               Leonid Reyzin and
               Stefano Tessaro},
  title     = {Scrypt Is Maximally Memory-Hard},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  pages     = {33--62},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-3},
  url       = {https://doi.org/10.1007/978-3-319-56617-7\_2},
  doi       = {10.1007/978-3-319-56617-7\_2},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/AlwenCPRT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/PietrzakS17,
  author    = {Krzysztof Pietrzak and
               Maciej Skorski},
  title     = {Non-Uniform Attacks Against Pseudoentropy},
  booktitle = {44th International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2017, July 10-14, 2017, Warsaw, Poland},
  pages     = {39:1--39:13},
  year      = {2017},
  crossref  = {DBLP:conf/icalp/2017},
  url       = {https://doi.org/10.4230/LIPIcs.ICALP.2017.39},
  doi       = {10.4230/LIPIcs.ICALP.2017.39},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/PietrzakS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrodyDFP17,
  author    = {Joshua Brody and
               Stefan Dziembowski and
               Sebastian Faust and
               Krzysztof Pietrzak},
  title     = {Position-Based Cryptography and Multiparty Communication Complexity},
  booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  pages     = {56--81},
  year      = {2017},
  crossref  = {DBLP:conf/tcc/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-70500-2\_3},
  doi       = {10.1007/978-3-319-70500-2\_3},
  timestamp = {Tue, 07 Nov 2017 12:31:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/BrodyDFP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PietrzakS17,
  author    = {Krzysztof Pietrzak and
               Maciej Skorski},
  title     = {Non-Uniform Attacks Against Pseudoentropy},
  journal   = {CoRR},
  volume    = {abs/1704.08678},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.08678},
  archivePrefix = {arXiv},
  eprint    = {1704.08678},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/PietrzakS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlwenBP17,
  author    = {Jo{\"{e}}l Alwen and
               Jeremiah Blocki and
               Krzysztof Pietrzak},
  title     = {Sustained Space Complexity},
  journal   = {CoRR},
  volume    = {abs/1705.05313},
  year      = {2017},
  url       = {http://arxiv.org/abs/1705.05313},
  archivePrefix = {arXiv},
  eprint    = {1705.05313},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AlwenBP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPR17,
  author    = {Peter Gazi and
               Krzysztof Pietrzak and
               Michal Ryb{\'{a}}r},
  title     = {The Exact Security of {PMAC}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {69},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/069},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GaziPR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JafargholiKKKPW17,
  author    = {Zahra Jafargholi and
               Chethan Kamath and
               Karen Klein and
               Ilan Komargodski and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Be Adaptive, Avoid Overcommitting},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {515},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/515},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JafargholiKKKPW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahACKPR17,
  author    = {Hamza Abusalah and
               Jo{\"{e}}l Alwen and
               Bram Cohen and
               Danylo Khilko and
               Krzysztof Pietrzak and
               Leonid Reyzin},
  title     = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs
               of Space},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {893},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/893},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AbusalahACKPR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/KrennPWW16,
  author    = {Stephan Krenn and
               Krzysztof Pietrzak and
               Akshay Wadia and
               Daniel Wichs},
  title     = {A counterexample to the chain rule for conditional {HILL} entropy},
  journal   = {Computational Complexity},
  volume    = {25},
  number    = {3},
  pages     = {567--605},
  year      = {2016},
  url       = {https://doi.org/10.1007/s00037-015-0120-9},
  doi       = {10.1007/s00037-015-0120-9},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cc/KrennPWW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GaziPR16,
  author    = {Peter Gazi and
               Krzysztof Pietrzak and
               Michal Ryb{\'{a}}r},
  title     = {The Exact Security of {PMAC}},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2016},
  number    = {2},
  pages     = {145--161},
  year      = {2016},
  url       = {https://doi.org/10.13154/tosc.v2016.i2.145-161},
  doi       = {10.13154/tosc.v2016.i2.145-161},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/GaziPR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AbusalahFP16,
  author    = {Hamza Abusalah and
               Georg Fuchsbauer and
               Krzysztof Pietrzak},
  title     = {Offline Witness Encryption},
  booktitle = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  pages     = {285--303},
  year      = {2016},
  crossref  = {DBLP:conf/acns/2016},
  url       = {https://doi.org/10.1007/978-3-319-39555-5\_16},
  doi       = {10.1007/978-3-319-39555-5\_16},
  timestamp = {Fri, 02 Nov 2018 09:42:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/AbusalahFP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbusalahFP16,
  author    = {Hamza Abusalah and
               Georg Fuchsbauer and
               Krzysztof Pietrzak},
  title     = {Constrained PRFs for Unbounded Inputs},
  booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  pages     = {413--428},
  year      = {2016},
  crossref  = {DBLP:conf/ctrsa/2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8\_24},
  doi       = {10.1007/978-3-319-29485-8\_24},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/AbusalahFP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenCKKPT16,
  author    = {Jo{\"{e}}l Alwen and
               Binyi Chen and
               Chethan Kamath and
               Vladimir Kolmogorov and
               Krzysztof Pietrzak and
               Stefano Tessaro},
  title     = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random
               Oracle Model},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  pages     = {358--387},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-49896-5\_13},
  doi       = {10.1007/978-3-662-49896-5\_13},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/AlwenCKKPT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PietrzakS16,
  author    = {Krzysztof Pietrzak and
               Maciej Sk{\'{o}}rski},
  title     = {Pseudoentropy: Lower-Bounds for Chain Rules and Transformations},
  booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  pages     = {183--203},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016b1},
  url       = {https://doi.org/10.1007/978-3-662-53641-4\_8},
  doi       = {10.1007/978-3-662-53641-4\_8},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/PietrzakS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FuchsbauerHKP16,
  author    = {Georg Fuchsbauer and
               Felix Heuer and
               Eike Kiltz and
               Krzysztof Pietrzak},
  title     = {Standard Security Does Imply Security Against Selective Opening for
               Markov Distributions},
  booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  pages     = {282--305},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016a1},
  url       = {https://doi.org/10.1007/978-3-662-49096-9\_12},
  doi       = {10.1007/978-3-662-49096-9\_12},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/FuchsbauerHKP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCKKPT16,
  author    = {Jo{\"{e}}l Alwen and
               Binyi Chen and
               Chethan Kamath and
               Vladimir Kolmogorov and
               Krzysztof Pietrzak and
               Stefano Tessaro},
  title     = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random
               Oracle Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {100},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/100},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlwenCKKPT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PietrzakS16,
  author    = {Krzysztof Pietrzak and
               Maciej Skorski},
  title     = {Pseudoentropy: Lower-bounds for Chain rules and Transformations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {159},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/159},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/PietrzakS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerJP16,
  author    = {Georg Fuchsbauer and
               Zahra Jafargholi and
               Krzysztof Pietrzak},
  title     = {A Quasipolynomial Reduction for Generalized Selective Decryption on
               Trees},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {389},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/389},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FuchsbauerJP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrodyDFP16,
  author    = {Joshua Brody and
               Stefan Dziembowski and
               Sebastian Faust and
               Krzysztof Pietrzak},
  title     = {Position-Based Cryptography and Multiparty Communication Complexity},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {536},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/536},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrodyDFP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinLP16,
  author    = {Marc Fischlin and
               Anja Lehmann and
               Krzysztof Pietrzak},
  title     = {Robust Multi-Property Combiners for Hash Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {723},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/723},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FischlinLP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenGKKOPRRR16,
  author    = {Jo{\"{e}}l Alwen and
               Peter Gazi and
               Chethan Kamath and
               Karen Klein and
               Georg Osang and
               Krzysztof Pietrzak and
               Leonid Reyzin and
               Michal Rol{\'{\i}}nek and
               Michal Ryb{\'{a}}r},
  title     = {On the Memory-Hardness of Data-Independent Password-Hashing Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {783},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/783},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlwenGKKOPRRR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenBP16,
  author    = {Jo{\"{e}}l Alwen and
               Jeremiah Blocki and
               Krzysztof Pietrzak},
  title     = {Depth-Robust Graphs and Their Cumulative Memory Complexity},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {875},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/875},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlwenBP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCPRT16,
  author    = {Jo{\"{e}}l Alwen and
               Binyi Chen and
               Krzysztof Pietrzak and
               Leonid Reyzin and
               Stefano Tessaro},
  title     = {Scrypt is Maximally Memory-Hard},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {989},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/989},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlwenCPRT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GaziPT15,
  author    = {Peter Gazi and
               Krzysztof Pietrzak and
               Stefano Tessaro},
  title     = {Generic Security of {NMAC} and {HMAC} with Input Whitening},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  pages     = {85--109},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48800-3\_4},
  doi       = {10.1007/978-3-662-48800-3\_4},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/GaziPT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkamotoPWW15,
  author    = {Tatsuaki Okamoto and
               Krzysztof Pietrzak and
               Brent Waters and
               Daniel Wichs},
  title     = {New Realizations of Somewhere Statistically Binding Hashing and Positional
               Accumulators},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  pages     = {121--145},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-48797-6\_6},
  doi       = {10.1007/978-3-662-48797-6\_6},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/OkamotoPWW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaziPT15,
  author    = {Peter Gazi and
               Krzysztof Pietrzak and
               Stefano Tessaro},
  title     = {The Exact {PRF} Security of Truncation: Tight Bounds for Keyed Sponges
               and Truncated {CBC}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  pages     = {368--387},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47989-6\_18},
  doi       = {10.1007/978-3-662-47989-6\_18},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/GaziPT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFKP15,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Vladimir Kolmogorov and
               Krzysztof Pietrzak},
  title     = {Proofs of Space},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  pages     = {585--605},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48000-7\_29},
  doi       = {10.1007/978-3-662-48000-7\_29},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/DziembowskiFKP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FuchsbauerJP15,
  author    = {Georg Fuchsbauer and
               Zahra Jafargholi and
               Krzysztof Pietrzak},
  title     = {A Quasipolynomial Reduction for Generalized Selective Decryption on
               Trees},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  pages     = {601--620},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47989-6\_29},
  doi       = {10.1007/978-3-662-47989-6\_29},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/FuchsbauerJP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BenhamoudaKLP15,
  author    = {Fabrice Benhamouda and
               Stephan Krenn and
               Vadim Lyubashevsky and
               Krzysztof Pietrzak},
  title     = {Efficient Zero-Knowledge Proofs for Commitments from Learning with
               Errors over Rings},
  booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {I}},
  pages     = {305--325},
  year      = {2015},
  crossref  = {DBLP:conf/esorics/2015-1},
  url       = {https://doi.org/10.1007/978-3-319-24174-6\_16},
  doi       = {10.1007/978-3-319-24174-6\_16},
  timestamp = {Sat, 24 Nov 2018 11:59:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/BenhamoudaKLP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/SkorskiGP15,
  author    = {Maciej Skorski and
               Alexander Golovnev and
               Krzysztof Pietrzak},
  title     = {Condensed Unpredictability},
  booktitle = {Automata, Languages, and Programming - 42nd International Colloquium,
               {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}},
  pages     = {1046--1057},
  year      = {2015},
  crossref  = {DBLP:conf/icalp/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47672-7\_85},
  doi       = {10.1007/978-3-662-47672-7\_85},
  timestamp = {Fri, 02 Nov 2018 09:50:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/SkorskiGP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/PietrzakS15,
  author    = {Krzysztof Pietrzak and
               Maciej Skorski},
  title     = {The Chain Rule for {HILL} Pseudoentropy, Revisited},
  booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  pages     = {81--98},
  year      = {2015},
  crossref  = {DBLP:conf/latincrypt/2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8\_5},
  doi       = {10.1007/978-3-319-22174-8\_5},
  timestamp = {Wed, 14 Nov 2018 11:00:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/latincrypt/PietrzakS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/0001FPPS15,
  author    = {Abhishek Banerjee and
               Georg Fuchsbauer and
               Chris Peikert and
               Krzysztof Pietrzak and
               Sophie Stevens},
  title     = {Key-Homomorphic Constrained Pseudorandom Functions},
  booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  pages     = {31--60},
  year      = {2015},
  crossref  = {DBLP:conf/tcc/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-46497-7\_2},
  doi       = {10.1007/978-3-662-46497-7\_2},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/0001FPPS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SkorskiGP15,
  author    = {Maciej Skorski and
               Alexander Golovnev and
               Krzysztof Pietrzak},
  title     = {Condensed Unpredictability},
  journal   = {CoRR},
  volume    = {abs/1504.07621},
  year      = {2015},
  url       = {http://arxiv.org/abs/1504.07621},
  archivePrefix = {arXiv},
  eprint    = {1504.07621},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/SkorskiGP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPT15,
  author    = {Peter Gazi and
               Krzysztof Pietrzak and
               Stefano Tessaro},
  title     = {Tight Bounds for Keyed Sponges and Truncated {CBC}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {53},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/053},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GaziPT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001FPPS15,
  author    = {Abhishek Banerjee and
               Georg Fuchsbauer and
               Chris Peikert and
               Krzysztof Pietrzak and
               Sophie Stevens},
  title     = {Key-Homomorphic Constrained Pseudorandom Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {180},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/180},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/0001FPPS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkorskiGP15,
  author    = {Maciej Skorski and
               Alexander Golovnev and
               Krzysztof Pietrzak},
  title     = {Condensed Unpredictability},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {384},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/384},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkorskiGP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzMP15,
  author    = {Eike Kiltz and
               Daniel Masny and
               Krzysztof Pietrzak},
  title     = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {401},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/401},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KiltzMP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParkPAFG15,
  author    = {Sunoo Park and
               Krzysztof Pietrzak and
               Albert Kwon and
               Jo{\"{e}}l Alwen and
               Georg Fuchsbauer and
               Peter Gazi},
  title     = {Spacemint: {A} Cryptocurrency Based on Proofs of Space},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {528},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/528},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ParkPAFG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PietrzakS15,
  author    = {Krzysztof Pietrzak and
               Maciej Skorski},
  title     = {The Chain Rule for {HILL} Pseudoentropy, Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {599},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/599},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/PietrzakS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahFP15,
  author    = {Hamza Abusalah and
               Georg Fuchsbauer and
               Krzysztof Pietrzak},
  title     = {Offline Witness Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {838},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/838},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AbusalahFP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuerKP15,
  author    = {Felix Heuer and
               Eike Kiltz and
               Krzysztof Pietrzak},
  title     = {Standard Security Does Imply Security Against Selective Opening for
               Markov Distributions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {853},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/853},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HeuerKP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoPWW15,
  author    = {Tatsuaki Okamoto and
               Krzysztof Pietrzak and
               Brent Waters and
               Daniel Wichs},
  title     = {New Realizations of Somewhere Statistically Binding Hashing and Positional
               Accumulators},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {869},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/869},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/OkamotoPWW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPT15a,
  author    = {Peter Gazi and
               Krzysztof Pietrzak and
               Stefano Tessaro},
  title     = {Generic Security of {NMAC} and {HMAC} with Input Whitening},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {881},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/881},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GaziPT15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FischlinLP14,
  author    = {Marc Fischlin and
               Anja Lehmann and
               Krzysztof Pietrzak},
  title     = {Robust Multi-Property Combiners for Hash Functions},
  journal   = {J. Cryptology},
  volume    = {27},
  number    = {3},
  pages     = {397--428},
  year      = {2014},
  url       = {https://doi.org/10.1007/s00145-013-9148-7},
  doi       = {10.1007/s00145-013-9148-7},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/FischlinLP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FuchsbauerKPR14,
  author    = {Georg Fuchsbauer and
               Momchil Konstantinov and
               Krzysztof Pietrzak and
               Vanishree Rao},
  title     = {Adaptive Security of Constrained PRFs},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  pages     = {82--101},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-662-45608-8\_5},
  doi       = {10.1007/978-3-662-45608-8\_5},
  timestamp = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/FuchsbauerKPR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaziPR14,
  author    = {Peter Gazi and
               Krzysztof Pietrzak and
               Michal Ryb{\'{a}}r},
  title     = {The Exact PRF-Security of {NMAC} and {HMAC}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {113--130},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2\_7},
  doi       = {10.1007/978-3-662-44371-2\_7},
  timestamp = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/GaziPR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisPW14,
  author    = {Yevgeniy Dodis and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Key Derivation without Entropy Waste},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  pages     = {93--110},
  year      = {2014},
  crossref  = {DBLP:conf/eurocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5\_6},
  doi       = {10.1007/978-3-642-55220-5\_6},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/DodisPW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KiltzMP14,
  author    = {Eike Kiltz and
               Daniel Masny and
               Krzysztof Pietrzak},
  title     = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  pages     = {1--18},
  year      = {2014},
  crossref  = {DBLP:conf/pkc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0\_1},
  doi       = {10.1007/978-3-642-54631-0\_1},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/KiltzMP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JetchevP14,
  author    = {Dimitar Jetchev and
               Krzysztof Pietrzak},
  title     = {How to Fake Auxiliary Input},
  booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  pages     = {566--590},
  year      = {2014},
  crossref  = {DBLP:conf/tcc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8\_24},
  doi       = {10.1007/978-3-642-54242-8\_24},
  timestamp = {Fri, 02 Nov 2018 09:44:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/JetchevP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerKPR14,
  author    = {Georg Fuchsbauer and
               Momchil Konstantinov and
               Krzysztof Pietrzak and
               Vanishree Rao},
  title     = {Adaptive Security of Constrained PRFs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {416},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/416},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FuchsbauerKPR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPR14,
  author    = {Peter Gazi and
               Krzysztof Pietrzak and
               Michal Ryb{\'{a}}r},
  title     = {The Exact PRF-Security of {NMAC} and {HMAC}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {578},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/578},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GaziPR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrennPWW14a,
  author    = {Stephan Krenn and
               Krzysztof Pietrzak and
               Akshay Wadia and
               Daniel Wichs},
  title     = {A Counterexample to the Chain Rule for Conditional {HILL} Entropy},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {678},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/678},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KrennPWW14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahFP14,
  author    = {Hamza Abusalah and
               Georg Fuchsbauer and
               Krzysztof Pietrzak},
  title     = {Constrained PRFs for Unbounded Inputs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {840},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/840},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AbusalahFP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaKLP14,
  author    = {Fabrice Benhamouda and
               Stephan Krenn and
               Vadim Lyubashevsky and
               Krzysztof Pietrzak},
  title     = {Efficient Zero-Knowledge Proofs for Commitments from Learning With
               Errors over Rings},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {889},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/889},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BenhamoudaKLP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenKPW13,
  author    = {Jo{\"{e}}l Alwen and
               Stephan Krenn and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Learning with Rounding, Revisited - New Reduction, Properties and
               Applications},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {57--74},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4\_4},
  doi       = {10.1007/978-3-642-40041-4\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/AlwenKPW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiltzPS13,
  author    = {Eike Kiltz and
               Krzysztof Pietrzak and
               Mario Szegedy},
  title     = {Digital Signatures with Minimal Overhead from Indifferentiable Random
               Invertible Functions},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {571--588},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4\_31},
  doi       = {10.1007/978-3-642-40041-4\_31},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/KiltzPS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KrennPW13,
  author    = {Stephan Krenn and
               Krzysztof Pietrzak and
               Akshay Wadia},
  title     = {A Counterexample to the Chain Rule for Conditional {HILL} Entropy
               - And What Deniable Encryption Has to Do with It},
  booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
               2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  pages     = {23--39},
  year      = {2013},
  crossref  = {DBLP:conf/tcc/2013},
  url       = {https://doi.org/10.1007/978-3-642-36594-2\_2},
  doi       = {10.1007/978-3-642-36594-2\_2},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/KrennPW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenKPW13,
  author    = {Jo{\"{e}}l Alwen and
               Stephan Krenn and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Learning with Rounding, Revisited: New Reduction, Properties and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {98},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/098},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlwenKPW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak13,
  author    = {Krzysztof Pietrzak},
  title     = {A Closer Look at {HMAC}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {212},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/212},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Pietrzak13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisPW13,
  author    = {Yevgeniy Dodis and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Key Derivation Without Entropy Waste},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {708},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/708},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DodisPW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFKP13,
  author    = {Stefan Dziembowski and
               Sebastian Faust and
               Vladimir Kolmogorov and
               Krzysztof Pietrzak},
  title     = {Proofs of Space},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {796},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/796},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiFKP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JetchevP13,
  author    = {Dimitar Jetchev and
               Krzysztof Pietrzak},
  title     = {How to Fake Auxiliary Input},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {869},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/869},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JetchevP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PietrzakW12,
  author    = {Krzysztof Pietrzak and
               Douglas Wikstr{\"{o}}m},
  title     = {Parallel Repetition of Computationally Sound Protocols Revisited},
  journal   = {J. Cryptology},
  volume    = {25},
  number    = {1},
  pages     = {116--135},
  year      = {2012},
  url       = {https://doi.org/10.1007/s00145-010-9090-x},
  doi       = {10.1007/s00145-010-9090-x},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/PietrzakW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0002KPT12,
  author    = {Abhishek Jain and
               Stephan Krenn and
               Krzysztof Pietrzak and
               Aris Tentes},
  title     = {Commitments and Efficient Zero-Knowledge Proofs from Learning Parity
               with Noise},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {663--680},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4\_40},
  doi       = {10.1007/978-3-642-34961-4\_40},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/0002KPT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FaustPS12,
  author    = {Sebastian Faust and
               Krzysztof Pietrzak and
               Joachim Schipper},
  title     = {Practical Leakage-Resilient Symmetric Cryptography},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
               Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  pages     = {213--232},
  year      = {2012},
  crossref  = {DBLP:conf/ches/2012},
  url       = {https://doi.org/10.1007/978-3-642-33027-8\_13},
  doi       = {10.1007/978-3-642-33027-8\_13},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/FaustPS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisKPW12,
  author    = {Yevgeniy Dodis and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Message Authentication, Revisited},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  pages     = {355--374},
  year      = {2012},
  crossref  = {DBLP:conf/eurocrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4\_22},
  doi       = {10.1007/978-3-642-29011-4\_22},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/DodisKPW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HeyseKLPP12,
  author    = {Stefan Heyse and
               Eike Kiltz and
               Vadim Lyubashevsky and
               Christof Paar and
               Krzysztof Pietrzak},
  title     = {Lapin: An Efficient Authentication Protocol Based on Ring-LPN},
  booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
               Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  pages     = {346--365},
  year      = {2012},
  crossref  = {DBLP:conf/fse/2012},
  url       = {https://doi.org/10.1007/978-3-642-34047-5\_20},
  doi       = {10.1007/978-3-642-34047-5\_20},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/HeyseKLPP12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/Pietrzak12,
  author    = {Krzysztof Pietrzak},
  title     = {Cryptography from Learning Parity with Noise},
  booktitle = {{SOFSEM} 2012: Theory and Practice of Computer Science - 38th Conference
               on Current Trends in Theory and Practice of Computer Science, {\v{S}}pindler{\r{u}}v
               Ml{\'{y}}n, Czech Republic, January 21-27, 2012. Proceedings},
  pages     = {99--114},
  year      = {2012},
  crossref  = {DBLP:conf/sofsem/2012},
  url       = {https://doi.org/10.1007/978-3-642-27660-6\_9},
  doi       = {10.1007/978-3-642-27660-6\_9},
  timestamp = {Tue, 23 May 2017 01:08:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sofsem/Pietrzak12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JainPT12,
  author    = {Abhishek Jain and
               Krzysztof Pietrzak and
               Aris Tentes},
  title     = {Hardness Preserving Constructions of Pseudorandom Functions},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {369--382},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9\_21},
  doi       = {10.1007/978-3-642-28914-9\_21},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/JainPT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PietrzakRS12,
  author    = {Krzysztof Pietrzak and
               Alon Rosen and
               Gil Segev},
  title     = {Lossy Functions Do Not Amplify Well},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {458--475},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9\_26},
  doi       = {10.1007/978-3-642-28914-9\_26},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/PietrzakRS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Pietrzak12,
  author    = {Krzysztof Pietrzak},
  title     = {Subspace {LWE}},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {548--563},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9\_31},
  doi       = {10.1007/978-3-642-28914-9\_31},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/Pietrzak12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKPW12,
  author    = {Yevgeniy Dodis and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Message Authentication, Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {59},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/059},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DodisKPW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002KPT12,
  author    = {Abhishek Jain and
               Stephan Krenn and
               Krzysztof Pietrzak and
               Aris Tentes},
  title     = {Commitments and Efficient Zero-Knowledge Proofs from Hard Learning
               Problems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {513},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/513},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/0002KPT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPS12,
  author    = {Eike Kiltz and
               Krzysztof Pietrzak and
               Mario Szegedy},
  title     = {Digital Signatures with Minimal Overhead},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {658},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/658},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KiltzPS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakDKPPSY11,
  author    = {Boaz Barak and
               Yevgeniy Dodis and
               Hugo Krawczyk and
               Olivier Pereira and
               Krzysztof Pietrzak and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Yu Yu},
  title     = {Leftover Hash Lemma, Revisited},
  booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  pages     = {1--20},
  year      = {2011},
  crossref  = {DBLP:conf/crypto/2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9\_1},
  doi       = {10.1007/978-3-642-22792-9\_1},
  timestamp = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BarakDKPPSY11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11,
  author    = {Eike Kiltz and
               Krzysztof Pietrzak and
               David Cash and
               Abhishek Jain and
               Daniele Venturi},
  title     = {Efficient Authentication from Hard Learning Problems},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tallinn, Estonia, May 15-19, 2011. Proceedings},
  pages     = {7--26},
  year      = {2011},
  crossref  = {DBLP:conf/eurocrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-20465-4\_3},
  doi       = {10.1007/978-3-642-20465-4\_3},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/KiltzPCJV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FaustPV11,
  author    = {Sebastian Faust and
               Krzysztof Pietrzak and
               Daniele Venturi},
  title     = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  booktitle = {Automata, Languages and Programming - 38th International Colloquium,
               {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
               {I}},
  pages     = {391--402},
  year      = {2011},
  crossref  = {DBLP:conf/icalp/2011-1},
  url       = {https://doi.org/10.1007/978-3-642-22006-7\_33},
  doi       = {10.1007/978-3-642-22006-7\_33},
  timestamp = {Thu, 15 Jun 2017 21:39:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/FaustPV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JainP11,
  author    = {Abhishek Jain and
               Krzysztof Pietrzak},
  title     = {Parallel Repetition for Leakage Resilience Amplification Revisited},
  booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  pages     = {58--69},
  year      = {2011},
  crossref  = {DBLP:conf/tcc/2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6\_5},
  doi       = {10.1007/978-3-642-19571-6\_5},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/JainP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakDKPPSY11,
  author    = {Boaz Barak and
               Yevgeniy Dodis and
               Hugo Krawczyk and
               Olivier Pereira and
               Krzysztof Pietrzak and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Yu Yu},
  title     = {Leftover Hash Lemma, Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {88},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/088},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BarakDKPPSY11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustPV11,
  author    = {Sebastian Faust and
               Krzysztof Pietrzak and
               Daniele Venturi},
  title     = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {314},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/314},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustPV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KiltzP10,
  author    = {Eike Kiltz and
               Krzysztof Pietrzak},
  title     = {Leakage Resilient ElGamal Encryption},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  pages     = {595--612},
  year      = {2010},
  crossref  = {DBLP:conf/asiacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8\_34},
  doi       = {10.1007/978-3-642-17373-8\_34},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/KiltzP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisP10,
  author    = {Yevgeniy Dodis and
               Krzysztof Pietrzak},
  title     = {Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks
               on Feistel Networks},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  pages     = {21--40},
  year      = {2010},
  crossref  = {DBLP:conf/crypto/2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7\_2},
  doi       = {10.1007/978-3-642-14623-7\_2},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/DodisP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DziembowskiPW10,
  author    = {Stefan Dziembowski and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Non-Malleable Codes},
  booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 5-7, 2010. Proceedings},
  pages     = {434--452},
  year      = {2010},
  crossref  = {DBLP:conf/innovations/2010},
  url       = {http://conference.itcs.tsinghua.edu.cn/ICS2010/content/papers/34.html},
  timestamp = {Mon, 27 Sep 2010 12:57:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/DziembowskiPW10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HastadPWP10,
  author    = {Johan H{\aa}stad and
               Rafael Pass and
               Douglas Wikstr{\"{o}}m and
               Krzysztof Pietrzak},
  title     = {An Efficient Parallel Repetition Theorem},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {1--18},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2\_1},
  doi       = {10.1007/978-3-642-11799-2\_1},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/HastadPWP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FaustKPR10,
  author    = {Sebastian Faust and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Guy N. Rothblum},
  title     = {Leakage-Resilient Signatures},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {343--360},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2\_21},
  doi       = {10.1007/978-3-642-11799-2\_21},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/FaustKPR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzP09,
  author    = {Eike Kiltz and
               Krzysztof Pietrzak},
  title     = {On the Security of Padding-Based Encryption Schemes - or - Why We
               Cannot Prove {OAEP} Secure in the Standard Model},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  pages     = {389--406},
  year      = {2009},
  crossref  = {DBLP:conf/eurocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9\_23},
  doi       = {10.1007/978-3-642-01001-9\_23},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/KiltzP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pietrzak09,
  author    = {Krzysztof Pietrzak},
  title     = {A Leakage-Resilient Mode of Operation},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  pages     = {462--482},
  year      = {2009},
  crossref  = {DBLP:conf/eurocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9\_27},
  doi       = {10.1007/978-3-642-01001-9\_27},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Pietrzak09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KiltzPSY09,
  author    = {Eike Kiltz and
               Krzysztof Pietrzak and
               Martijn Stam and
               Moti Yung},
  title     = {A New Randomness Extraction Paradigm for Hybrid Encryption},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  pages     = {590--609},
  year      = {2009},
  crossref  = {DBLP:conf/eurocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9\_34},
  doi       = {10.1007/978-3-642-01001-9\_34},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/KiltzPSY09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKPR09,
  author    = {Sebastian Faust and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Guy N. Rothblum},
  title     = {Leakage-Resilient Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {282},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/282},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustKPR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiPW09,
  author    = {Stefan Dziembowski and
               Krzysztof Pietrzak and
               Daniel Wichs},
  title     = {Non-Malleable Codes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {608},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/608},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiPW09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Pietrzak08,
  author    = {Krzysztof Pietrzak},
  title     = {Compression from Collisions, or Why {CRHF} Combiners Have a Long Output},
  booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  pages     = {413--432},
  year      = {2008},
  crossref  = {DBLP:conf/crypto/2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5\_23},
  doi       = {10.1007/978-3-540-85174-5\_23},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/Pietrzak08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisPP08,
  author    = {Yevgeniy Dodis and
               Krzysztof Pietrzak and
               Prashant Puniya},
  title     = {A New Mode of Operation for Block Ciphers and Length-Preserving MACs},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Istanbul, Turkey, April 13-17, 2008. Proceedings},
  pages     = {198--219},
  year      = {2008},
  crossref  = {DBLP:conf/eurocrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-78967-3\_12},
  doi       = {10.1007/978-3-540-78967-3\_12},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/DodisPP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DziembowskiP08,
  author    = {Stefan Dziembowski and
               Krzysztof Pietrzak},
  title     = {Leakage-Resilient Cryptography},
  booktitle = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  pages     = {293--302},
  year      = {2008},
  crossref  = {DBLP:conf/focs/2008},
  url       = {https://doi.org/10.1109/FOCS.2008.56},
  doi       = {10.1109/FOCS.2008.56},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/focs/DziembowskiP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/PietrzakS08,
  author    = {Krzysztof Pietrzak and
               Johan Sj{\"{o}}din},
  title     = {Weak Pseudorandom Functions in Minicrypt},
  booktitle = {Automata, Languages and Programming, 35th International Colloquium,
               {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
               {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
               Track {C:} Security and Cryptography Foundations},
  pages     = {423--436},
  year      = {2008},
  crossref  = {DBLP:conf/icalp/2008-2},
  url       = {https://doi.org/10.1007/978-3-540-70583-3\_35},
  doi       = {10.1007/978-3-540-70583-3\_35},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/PietrzakS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FischlinLP08,
  author    = {Marc Fischlin and
               Anja Lehmann and
               Krzysztof Pietrzak},
  title     = {Robust Multi-property Combiners for Hash Functions Revisited},
  booktitle = {Automata, Languages and Programming, 35th International Colloquium,
               {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
               {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
               Track {C:} Security and Cryptography Foundations},
  pages     = {655--666},
  year      = {2008},
  crossref  = {DBLP:conf/icalp/2008-2},
  url       = {https://doi.org/10.1007/978-3-540-70583-3\_53},
  doi       = {10.1007/978-3-540-70583-3\_53},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/FischlinLP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiP08,
  author    = {Stefan Dziembowski and
               Krzysztof Pietrzak},
  title     = {Leakage-Resilient Cryptography in the Standard Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {240},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/240},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPSY08,
  author    = {Eike Kiltz and
               Krzysztof Pietrzak and
               Martijn Stam and
               Moti Yung},
  title     = {A New Randomness Extraction Paradigm for Hybrid Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {304},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/304},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KiltzPSY08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MaurerPR07,
  author    = {Ueli M. Maurer and
               Krzysztof Pietrzak and
               Renato Renner},
  title     = {Indistinguishability Amplification},
  booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  pages     = {130--149},
  year      = {2007},
  crossref  = {DBLP:conf/crypto/2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5\_8},
  doi       = {10.1007/978-3-540-74143-5\_8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/MaurerPR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pietrzak07,
  author    = {Krzysztof Pietrzak},
  title     = {Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions
               Don't Exist},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  pages     = {23--33},
  year      = {2007},
  crossref  = {DBLP:conf/eurocrypt/2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4\_2},
  doi       = {10.1007/978-3-540-72540-4\_2},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Pietrzak07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PietrzakS07,
  author    = {Krzysztof Pietrzak and
               Johan Sj{\"{o}}din},
  title     = {Range Extension for Weak PRFs; The Good, the Bad, and the Ugly},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  pages     = {517--533},
  year      = {2007},
  crossref  = {DBLP:conf/eurocrypt/2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4\_30},
  doi       = {10.1007/978-3-540-72540-4\_30},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/PietrzakS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DziembowskiP07,
  author    = {Stefan Dziembowski and
               Krzysztof Pietrzak},
  title     = {Intrusion-Resilient Secret Sharing},
  booktitle = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
               2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  pages     = {227--237},
  year      = {2007},
  crossref  = {DBLP:conf/focs/2007},
  url       = {https://doi.org/10.1109/FOCS.2007.63},
  doi       = {10.1109/FOCS.2007.63},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/focs/DziembowskiP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DodisP07,
  author    = {Yevgeniy Dodis and
               Krzysztof Pietrzak},
  title     = {Improving the Security of MACs Via Randomized Message Preprocessing},
  booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  pages     = {414--433},
  year      = {2007},
  crossref  = {DBLP:conf/fse/2007},
  url       = {https://doi.org/10.1007/978-3-540-74619-5\_26},
  doi       = {10.1007/978-3-540-74619-5\_26},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/DodisP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PietrzakW07,
  author    = {Krzysztof Pietrzak and
               Douglas Wikstr{\"{o}}m},
  title     = {Parallel Repetition of Computationally Sound Protocols Revisited},
  booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
               2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  pages     = {86--102},
  year      = {2007},
  crossref  = {DBLP:conf/tcc/2007},
  url       = {https://doi.org/10.1007/978-3-540-70936-7\_5},
  doi       = {10.1007/978-3-540-70936-7\_5},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/PietrzakW07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiP07,
  author    = {Stefan Dziembowski and
               Krzysztof Pietrzak},
  title     = {Intrusion-Resilient Secret Sharing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {359},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/359},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DziembowskiP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ch/Pietrzak2006,
  author    = {Krzysztof Pietrzak},
  title     = {Indistinguishability and composition of random systems},
  school    = {{ETH} Zurich},
  year      = {2006},
  url       = {http://d-nb.info/978735072},
  isbn      = {3-86628-063-7},
  timestamp = {Wed, 04 May 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/ch/Pietrzak2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pietrzak06,
  author    = {Krzysztof Pietrzak},
  title     = {Composition Implies Adaptive Security in Minicrypt},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  pages     = {328--338},
  year      = {2006},
  crossref  = {DBLP:conf/eurocrypt/2006},
  url       = {https://doi.org/10.1007/11761679\_20},
  doi       = {10.1007/11761679\_20},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Pietrzak06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MaurerOPS06,
  author    = {Ueli M. Maurer and
               Yvonne Anne Oswald and
               Krzysztof Pietrzak and
               Johan Sj{\"{o}}din},
  title     = {Luby-Rackoff Ciphers from Weak Round Functions?},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  pages     = {391--408},
  year      = {2006},
  crossref  = {DBLP:conf/eurocrypt/2006},
  url       = {https://doi.org/10.1007/11761679\_24},
  doi       = {10.1007/11761679\_24},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/MaurerOPS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Pietrzak06,
  author    = {Krzysztof Pietrzak},
  title     = {A Tight Bound for {EMAC}},
  booktitle = {Automata, Languages and Programming, 33rd International Colloquium,
               {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  pages     = {168--179},
  year      = {2006},
  crossref  = {DBLP:conf/icalp/2006-2},
  url       = {https://doi.org/10.1007/11787006\_15},
  doi       = {10.1007/11787006\_15},
  timestamp = {Wed, 14 Nov 2018 11:00:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/Pietrzak06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisPP06,
  author    = {Yevgeniy Dodis and
               Krzysztof Pietrzak and
               Bartosz Przydatek},
  title     = {Separating Sources for Encryption and Secret Sharing},
  booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
               2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  pages     = {601--616},
  year      = {2006},
  crossref  = {DBLP:conf/tcc/2006},
  url       = {https://doi.org/10.1007/11681878\_31},
  doi       = {10.1007/11681878\_31},
  timestamp = {Wed, 14 Nov 2018 10:57:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/DodisPP06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerOPS06,
  author    = {Ueli Maurer and
               Yvonne Anne Oswald and
               Krzysztof Pietrzak and
               Johan Sj{\"{o}}din},
  title     = {Luby-Rackoff Ciphers from Weak Round Functions?},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {213},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/213},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MaurerOPS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak06,
  author    = {Krzysztof Pietrzak},
  title     = {Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions
               don't Exist},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {348},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/348},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Pietrzak06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerPR06,
  author    = {Ueli Maurer and
               Krzysztof Pietrzak and
               Renato Renner},
  title     = {Indistinguishability Amplification},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {456},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/456},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MaurerPR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Pietrzak05,
  author    = {Krzysztof Pietrzak},
  title     = {Composition Does Not Imply Adaptive Security},
  booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  pages     = {55--65},
  year      = {2005},
  crossref  = {DBLP:conf/crypto/2005},
  url       = {https://doi.org/10.1007/11535218\_4},
  doi       = {10.1007/11535218\_4},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/Pietrzak05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisOP05,
  author    = {Yevgeniy Dodis and
               Roberto Oliveira and
               Krzysztof Pietrzak},
  title     = {On the Generic Insecurity of the Full Domain Hash},
  booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  pages     = {449--466},
  year      = {2005},
  crossref  = {DBLP:conf/crypto/2005},
  url       = {https://doi.org/10.1007/11535218\_27},
  doi       = {10.1007/11535218\_27},
  timestamp = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/DodisOP05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellarePR05,
  author    = {Mihir Bellare and
               Krzysztof Pietrzak and
               Phillip Rogaway},
  title     = {Improved Security Analyses for {CBC} MACs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  pages     = {527--545},
  year      = {2005},
  crossref  = {DBLP:conf/crypto/2005},
  url       = {https://doi.org/10.1007/11535218\_32},
  doi       = {10.1007/11535218\_32},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BellarePR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MaurerP04,
  author    = {Ueli M. Maurer and
               Krzysztof Pietrzak},
  title     = {Composition of Random Systems: When Two Weak Make One Strong},
  booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
               2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  pages     = {410--427},
  year      = {2004},
  crossref  = {DBLP:conf/tcc/2004},
  url       = {https://doi.org/10.1007/978-3-540-24638-1\_23},
  doi       = {10.1007/978-3-540-24638-1\_23},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/MaurerP04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/Pietrzak03,
  author    = {Krzysztof Pietrzak},
  title     = {On the parameterized complexity of the fixed alphabet shortest common
               supersequence and longest common subsequence problems},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {67},
  number    = {4},
  pages     = {757--771},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0022-0000(03)00078-3},
  doi       = {10.1016/S0022-0000(03)00078-3},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcss/Pietrzak03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MaurerP03,
  author    = {Ueli M. Maurer and
               Krzysztof Pietrzak},
  title     = {The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
               on the Theory and Applications of Cryptographic Techniques, Warsaw,
               Poland, May 4-8, 2003, Proceedings},
  pages     = {544--561},
  year      = {2003},
  crossref  = {DBLP:conf/eurocrypt/2003},
  url       = {https://doi.org/10.1007/3-540-39200-9\_34},
  doi       = {10.1007/3-540-39200-9\_34},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/MaurerP03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2019,
  editor    = {Avrim Blum},
  title     = {10th Innovations in Theoretical Computer Science Conference, {ITCS}
               2019, January 10-12, 2019, San Diego, California, {USA}},
  series    = {LIPIcs},
  volume    = {124},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2018},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-095-8},
  isbn      = {978-3-95977-095-8},
  timestamp = {Tue, 08 Jan 2019 13:39:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asia,
  editor    = {Jong Kim and
               Gail{-}Joon Ahn and
               Seungjoo Kim and
               Yongdae Kim and
               Javier L{\'{o}}pez and
               Taesoo Kim},
  title     = {Proceedings of the 2018 on Asia Conference on Computer and Communications
               Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3196494},
  doi       = {10.1145/3196494},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-2,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10821},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78375-8},
  doi       = {10.1007/978-3-319-78375-8},
  isbn      = {978-3-319-78374-1},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2017-2,
  editor    = {Tsuyoshi Takagi and
               Thomas Peyrin},
  title     = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10625},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70697-9},
  doi       = {10.1007/978-3-319-70697-9},
  isbn      = {978-3-319-70696-2},
  timestamp = {Wed, 22 Nov 2017 13:46:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-1,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10401},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63688-7},
  doi       = {10.1007/978-3-319-63688-7},
  isbn      = {978-3-319-63687-0},
  timestamp = {Mon, 14 Aug 2017 14:32:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-3,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10212},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56617-7},
  doi       = {10.1007/978-3-319-56617-7},
  isbn      = {978-3-319-56616-0},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2017-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2017,
  editor    = {Ioannis Chatzigiannakis and
               Piotr Indyk and
               Fabian Kuhn and
               Anca Muscholl},
  title     = {44th International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2017, July 10-14, 2017, Warsaw, Poland},
  series    = {LIPIcs},
  volume    = {80},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2017},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-041-5},
  isbn      = {978-3-95977-041-5},
  timestamp = {Mon, 17 Jul 2017 16:47:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-1,
  editor    = {Yael Kalai and
               Leonid Reyzin},
  title     = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10677},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70500-2},
  doi       = {10.1007/978-3-319-70500-2},
  isbn      = {978-3-319-70499-9},
  timestamp = {Tue, 07 Nov 2017 12:31:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2016,
  editor    = {Mark Manulis and
               Ahmad{-}Reza Sadeghi and
               Steve Schneider},
  title     = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9696},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-39555-5},
  doi       = {10.1007/978-3-319-39555-5},
  isbn      = {978-3-319-39554-8},
  timestamp = {Fri, 02 Nov 2018 09:42:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2016,
  editor    = {Kazue Sako},
  title     = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9610},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8},
  doi       = {10.1007/978-3-319-29485-8},
  isbn      = {978-3-319-29484-1},
  timestamp = {Sun, 21 May 2017 00:20:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-2,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9666},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49896-5},
  doi       = {10.1007/978-3-662-49896-5},
  isbn      = {978-3-662-49895-8},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b1,
  editor    = {Martin Hirt and
               Adam D. Smith},
  title     = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9985},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53641-4},
  doi       = {10.1007/978-3-662-53641-4},
  isbn      = {978-3-662-53640-7},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2016b1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016a1,
  editor    = {Eyal Kushilevitz and
               Tal Malkin},
  title     = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
               Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9562},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49096-9},
  doi       = {10.1007/978-3-662-49096-9},
  isbn      = {978-3-662-49095-2},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2016a1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-2,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3},
  doi       = {10.1007/978-3-662-48800-3},
  isbn      = {978-3-662-48799-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-1,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9452},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48797-6},
  doi       = {10.1007/978-3-662-48797-6},
  isbn      = {978-3-662-48796-9},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-1,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9215},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47989-6},
  doi       = {10.1007/978-3-662-47989-6},
  isbn      = {978-3-662-47988-9},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9216},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48000-7},
  doi       = {10.1007/978-3-662-48000-7},
  isbn      = {978-3-662-47999-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015-1,
  editor    = {G{\"{u}}nther Pernul and
               Peter Y. A. Ryan and
               Edgar R. Weippl},
  title     = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9326},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-24174-6},
  doi       = {10.1007/978-3-319-24174-6},
  isbn      = {978-3-319-24173-9},
  timestamp = {Sat, 24 Nov 2018 11:59:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2015-1,
  editor    = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
               Kazuo Iwama and
               Naoki Kobayashi and
               Bettina Speckmann},
  title     = {Automata, Languages, and Programming - 42nd International Colloquium,
               {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9134},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47672-7},
  doi       = {10.1007/978-3-662-47672-7},
  isbn      = {978-3-662-47671-0},
  timestamp = {Fri, 02 Nov 2018 09:50:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latincrypt/2015,
  editor    = {Kristin E. Lauter and
               Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title     = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9230},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8},
  doi       = {10.1007/978-3-319-22174-8},
  isbn      = {978-3-319-22173-1},
  timestamp = {Wed, 14 Nov 2018 11:00:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/latincrypt/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2015-2,
  editor    = {Yevgeniy Dodis and
               Jesper Buus Nielsen},
  title     = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9015},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46497-7},
  doi       = {10.1007/978-3-662-46497-7},
  isbn      = {978-3-662-46496-0},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8874},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45608-8},
  doi       = {10.1007/978-3-662-45608-8},
  isbn      = {978-3-662-45607-1},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2014,
  editor    = {Phong Q. Nguyen and
               Elisabeth Oswald},
  title     = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8441},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5},
  doi       = {10.1007/978-3-642-55220-5},
  isbn      = {978-3-642-55219-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2014,
  editor    = {Hugo Krawczyk},
  title     = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0},
  doi       = {10.1007/978-3-642-54631-0},
  isbn      = {978-3-642-54630-3},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2014,
  editor    = {Yehuda Lindell},
  title     = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8349},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8},
  doi       = {10.1007/978-3-642-54242-8},
  isbn      = {978-3-642-54241-1},
  timestamp = {Fri, 02 Nov 2018 09:44:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40041-4},
  doi       = {10.1007/978-3-642-40041-4},
  isbn      = {978-3-642-40040-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2013-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2013,
  editor    = {Amit Sahai},
  title     = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
               2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7785},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-36594-2},
  doi       = {10.1007/978-3-642-36594-2},
  isbn      = {978-3-642-36593-5},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2012,
  editor    = {Xiaoyun Wang and
               Kazue Sako},
  title     = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7658},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4},
  doi       = {10.1007/978-3-642-34961-4},
  isbn      = {978-3-642-34960-7},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2012,
  editor    = {Emmanuel Prouff and
               Patrick Schaumont},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
               Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7428},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33027-8},
  doi       = {10.1007/978-3-642-33027-8},
  isbn      = {978-3-642-33026-1},
  timestamp = {Sun, 21 May 2017 00:18:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2012,
  editor    = {David Pointcheval and
               Thomas Johansson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7237},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4},
  doi       = {10.1007/978-3-642-29011-4},
  isbn      = {978-3-642-29010-7},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2012,
  editor    = {Anne Canteaut},
  title     = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
               Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7549},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34047-5},
  doi       = {10.1007/978-3-642-34047-5},
  isbn      = {978-3-642-34046-8},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sofsem/2012,
  editor    = {M{\'{a}}ria Bielikov{\'{a}} and
               Gerhard Friedrich and
               Georg Gottlob and
               Stefan Katzenbeisser and
               Gy{\"{o}}rgy Tur{\'{a}}n},
  title     = {{SOFSEM} 2012: Theory and Practice of Computer Science - 38th Conference
               on Current Trends in Theory and Practice of Computer Science, {\v{S}}pindler{\r{u}}v
               Ml{\'{y}}n, Czech Republic, January 21-27, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7147},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-27660-6},
  doi       = {10.1007/978-3-642-27660-6},
  isbn      = {978-3-642-27659-0},
  timestamp = {Tue, 23 May 2017 01:08:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sofsem/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2012,
  editor    = {Ronald Cramer},
  title     = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7194},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9},
  doi       = {10.1007/978-3-642-28914-9},
  isbn      = {978-3-642-28913-2},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2011,
  editor    = {Phillip Rogaway},
  title     = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6841},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9},
  doi       = {10.1007/978-3-642-22792-9},
  isbn      = {978-3-642-22791-2},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2011,
  editor    = {Kenneth G. Paterson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6632},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20465-4},
  doi       = {10.1007/978-3-642-20465-4},
  isbn      = {978-3-642-20464-7},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2011-1,
  editor    = {Luca Aceto and
               Monika Henzinger and
               Jir{\'{\i}} Sgall},
  title     = {Automata, Languages and Programming - 38th International Colloquium,
               {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {6755},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22006-7},
  doi       = {10.1007/978-3-642-22006-7},
  isbn      = {978-3-642-22005-0},
  timestamp = {Thu, 15 Jun 2017 21:39:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2011-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2011,
  editor    = {Yuval Ishai},
  title     = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6597},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6},
  doi       = {10.1007/978-3-642-19571-6},
  isbn      = {978-3-642-19570-9},
  timestamp = {Tue, 13 Jun 2017 11:30:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2010,
  editor    = {Masayuki Abe},
  title     = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6477},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8},
  doi       = {10.1007/978-3-642-17373-8},
  isbn      = {978-3-642-17372-1},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor    = {Tal Rabin},
  title     = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7},
  doi       = {10.1007/978-3-642-14623-7},
  isbn      = {978-3-642-14622-0},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2010,
  editor    = {Andrew Chi{-}Chih Yao},
  title     = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 5-7, 2010. Proceedings},
  publisher = {Tsinghua University Press},
  year      = {2010},
  isbn      = {978-7-302-21752-7},
  timestamp = {Mon, 27 Sep 2010 12:57:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2010,
  editor    = {Daniele Micciancio},
  title     = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5978},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2},
  doi       = {10.1007/978-3-642-11799-2},
  isbn      = {978-3-642-11798-5},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2009,
  editor    = {Antoine Joux},
  title     = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5479},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9},
  doi       = {10.1007/978-3-642-01001-9},
  isbn      = {978-3-642-01000-2},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2008,
  editor    = {David A. Wagner},
  title     = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5157},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5},
  doi       = {10.1007/978-3-540-85174-5},
  isbn      = {978-3-540-85173-8},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2008,
  editor    = {Nigel P. Smart},
  title     = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4965},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-78967-3},
  doi       = {10.1007/978-3-540-78967-3},
  isbn      = {978-3-540-78966-6},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/focs/2008,
  title     = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4690923},
  isbn      = {978-0-7695-3436-7},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/focs/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2008-2,
  editor    = {Luca Aceto and
               Ivan Damg{\aa}rd and
               Leslie Ann Goldberg and
               Magn{\'{u}}s M. Halld{\'{o}}rsson and
               Anna Ing{\'{o}}lfsd{\'{o}}ttir and
               Igor Walukiewicz},
  title     = {Automata, Languages and Programming, 35th International Colloquium,
               {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
               {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
               Track {C:} Security and Cryptography Foundations},
  series    = {Lecture Notes in Computer Science},
  volume    = {5126},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-70583-3},
  doi       = {10.1007/978-3-540-70583-3},
  isbn      = {978-3-540-70582-6},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2008-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2007,
  editor    = {Alfred Menezes},
  title     = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4622},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5},
  doi       = {10.1007/978-3-540-74143-5},
  isbn      = {978-3-540-74142-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2007,
  editor    = {Moni Naor},
  title     = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4515},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4},
  doi       = {10.1007/978-3-540-72540-4},
  isbn      = {978-3-540-72539-8},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/focs/2007,
  title     = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
               2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4389466},
  isbn      = {978-0-7695-3010-9},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/focs/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2007,
  editor    = {Alex Biryukov},
  title     = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4593},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74619-5},
  doi       = {10.1007/978-3-540-74619-5},
  isbn      = {978-3-540-74617-1},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2007,
  editor    = {Salil P. Vadhan},
  title     = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
               2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4392},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-70936-7},
  doi       = {10.1007/978-3-540-70936-7},
  isbn      = {3-540-70935-5},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2006,
  editor    = {Serge Vaudenay},
  title     = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4004},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11761679},
  doi       = {10.1007/11761679},
  isbn      = {3-540-34546-9},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2006-2,
  editor    = {Michele Bugliesi and
               Bart Preneel and
               Vladimiro Sassone and
               Ingo Wegener},
  title     = {Automata, Languages and Programming, 33rd International Colloquium,
               {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {4052},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11787006},
  doi       = {10.1007/11787006},
  isbn      = {3-540-35907-9},
  timestamp = {Wed, 14 Nov 2018 11:00:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2006-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2006,
  editor    = {Shai Halevi and
               Tal Rabin},
  title     = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
               2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3876},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11681878},
  doi       = {10.1007/11681878},
  isbn      = {3-540-32731-2},
  timestamp = {Wed, 14 Nov 2018 10:57:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2005,
  editor    = {Victor Shoup},
  title     = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3621},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11535218},
  doi       = {10.1007/11535218},
  isbn      = {3-540-28114-2},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2004,
  editor    = {Moni Naor},
  title     = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
               2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2951},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95566},
  doi       = {10.1007/b95566},
  isbn      = {3-540-21000-8},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2003,
  editor    = {Eli Biham},
  title     = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
               on the Theory and Applications of Cryptographic Techniques, Warsaw,
               Poland, May 4-8, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2656},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-39200-9},
  doi       = {10.1007/3-540-39200-9},
  isbn      = {3-540-14039-5},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier