BibTeX records: Sven Schäge

download as .bib file

@article{DBLP:journals/iacr/HovelmannsKSU18,
  author    = {Kathrin H{\"{o}}velmanns and
               Eike Kiltz and
               Sven Sch{\"{a}}ge and
               Dominique Unruh},
  title     = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {928},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/928},
  timestamp = {Mon, 15 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HovelmannsKSU18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JagerKSS17,
  author    = {Tibor Jager and
               Florian Kohlar and
               Sven Sch{\"{a}}ge and
               J{\"{o}}rg Schwenk},
  title     = {Authenticated Confidential Channel Establishment and the Security
               of {TLS-DHE}},
  journal   = {J. Cryptology},
  volume    = {30},
  number    = {4},
  pages     = {1276--1324},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00145-016-9248-2},
  doi       = {10.1007/s00145-016-9248-2},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/joc/JagerKSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiS17,
  author    = {Yong Li and
               Sven Sch{\"{a}}ge},
  title     = {No-Match Attacks and Robust Partnering Definitions: Defining Trivial
               Attacks for Security Protocols is Not Trivial},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {1343--1360},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {https://doi.org/10.1145/3133956.3134006},
  doi       = {10.1145/3133956.3134006},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/LiS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiS17,
  author    = {Yong Li and
               Sven Sch{\"{a}}ge},
  title     = {No-Match Attacks and Robust Partnering Definitions - Defining Trivial
               Attacks for Security Protocols is Not Trivial},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {818},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/818},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LiS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HeuerJSK16,
  author    = {Felix Heuer and
               Tibor Jager and
               Sven Sch{\"{a}}ge and
               Eike Kiltz},
  title     = {Selective opening security of practical public-key encryption schemes},
  journal   = {{IET} Information Security},
  volume    = {10},
  number    = {6},
  pages     = {304--318},
  year      = {2016},
  url       = {https://doi.org/10.1049/iet-ifs.2015.0507},
  doi       = {10.1049/iet-ifs.2015.0507},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iet-ifs/HeuerJSK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BaderJLS16,
  author    = {Christoph Bader and
               Tibor Jager and
               Yong Li and
               Sven Sch{\"{a}}ge},
  title     = {On the Impossibility of Tight Cryptographic Reductions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  pages     = {273--304},
  year      = {2016},
  crossref  = {DBLP:conf/eurocrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-49896-5\_10},
  doi       = {10.1007/978-3-662-49896-5\_10},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/BaderJLS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuerJKS16,
  author    = {Felix Heuer and
               Tibor Jager and
               Eike Kiltz and
               Sven Sch{\"{a}}ge},
  title     = {On the Selective Opening Security of Practical Public-Key Encryption
               Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {342},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/342},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HeuerJKS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Schage15,
  author    = {Sven Sch{\"{a}}ge},
  title     = {Tight Security for Signature Schemes Without Random Oracles},
  journal   = {J. Cryptology},
  volume    = {28},
  number    = {3},
  pages     = {641--670},
  year      = {2015},
  url       = {https://doi.org/10.1007/s00145-013-9173-6},
  doi       = {10.1007/s00145-013-9173-6},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/joc/Schage15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Schage15,
  author    = {Sven Sch{\"{a}}ge},
  title     = {{TOPAS:} 2-Pass Key Exchange with Full Perfect Forward Secrecy and
               Optimal Communication Complexity},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {1224--1235},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {https://doi.org/10.1145/2810103.2813683},
  doi       = {10.1145/2810103.2813683},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Schage15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HeuerJKS15,
  author    = {Felix Heuer and
               Tibor Jager and
               Eike Kiltz and
               Sven Sch{\"{a}}ge},
  title     = {On the Selective Opening Security of Practical Public-Key Encryption
               Schemes},
  booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  pages     = {27--51},
  year      = {2015},
  crossref  = {DBLP:conf/pkc/2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2\_2},
  doi       = {10.1007/978-3-662-46447-2\_2},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/HeuerJKS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaderJLS15,
  author    = {Christoph Bader and
               Tibor Jager and
               Yong Li and
               Sven Sch{\"{a}}ge},
  title     = {On the Impossibility of Tight Cryptographic Reductions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {374},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/374},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaderJLS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiSYBS14,
  author    = {Yong Li and
               Sven Sch{\"{a}}ge and
               Zheng Yang and
               Christoph Bader and
               J{\"{o}}rg Schwenk},
  title     = {New Modular Compilers for Authenticated Key Exchange},
  booktitle = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  pages     = {1--18},
  year      = {2014},
  crossref  = {DBLP:conf/acns/2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5\_1},
  doi       = {10.1007/978-3-319-07536-5\_1},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/LiSYBS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiSYKS14,
  author    = {Yong Li and
               Sven Sch{\"{a}}ge and
               Zheng Yang and
               Florian Kohlar and
               J{\"{o}}rg Schwenk},
  title     = {On the Security of the Pre-shared Key Ciphersuites of {TLS}},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  pages     = {669--684},
  year      = {2014},
  crossref  = {DBLP:conf/pkc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0\_38},
  doi       = {10.1007/978-3-642-54631-0\_38},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/LiSYKS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSYKS14,
  author    = {Yong Li and
               Sven Sch{\"{a}}ge and
               Zheng Yang and
               Florian Kohlar and
               J{\"{o}}rg Schwenk},
  title     = {On the Security of the Pre-Shared Key Ciphersuites of {TLS}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {37},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/037},
  timestamp = {Mon, 03 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LiSYKS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohlarSS13,
  author    = {Florian Kohlar and
               Sven Sch{\"{a}}ge and
               J{\"{o}}rg Schwenk},
  title     = {On the Security of {TLS-DH} and {TLS-RSA} in the Standard Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {367},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/367},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KohlarSS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JagerKSS12,
  author    = {Tibor Jager and
               Florian Kohlar and
               Sven Sch{\"{a}}ge and
               J{\"{o}}rg Schwenk},
  title     = {On the Security of {TLS-DHE} in the Standard Model},
  booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  pages     = {273--293},
  year      = {2012},
  crossref  = {DBLP:conf/crypto/2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5\_17},
  doi       = {10.1007/978-3-642-32009-5\_17},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/JagerKSS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Schage12,
  author    = {Sven Sch{\"{a}}ge},
  title     = {Strong Security from Probabilistic Signature Schemes},
  booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  pages     = {84--101},
  year      = {2012},
  crossref  = {DBLP:conf/pkc/2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8\_6},
  doi       = {10.1007/978-3-642-30057-8\_6},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/Schage12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Schage11,
  author    = {Sven Sch{\"{a}}ge},
  title     = {Tight Proofs for Signature Schemes without Random Oracles},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tallinn, Estonia, May 15-19, 2011. Proceedings},
  pages     = {189--206},
  year      = {2011},
  crossref  = {DBLP:conf/eurocrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-20465-4\_12},
  doi       = {10.1007/978-3-642-20465-4\_12},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Schage11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKSS11,
  author    = {Tibor Jager and
               Florian Kohlar and
               Sven Sch{\"{a}}ge and
               J{\"{o}}rg Schwenk},
  title     = {A Standard-Model Security Analysis of {TLS-DHE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {219},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/219},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JagerKSS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/JensenSS10,
  author    = {Meiko Jensen and
               Sven Sch{\"{a}}ge and
               J{\"{o}}rg Schwenk},
  title     = {Towards an Anonymous Access Control and Accountability Scheme for
               Cloud Computing},
  booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2010,
               Miami, FL, USA, 5-10 July, 2010},
  pages     = {540--541},
  year      = {2010},
  crossref  = {DBLP:conf/IEEEcloud/2010},
  url       = {https://doi.org/10.1109/CLOUD.2010.61},
  doi       = {10.1109/CLOUD.2010.61},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcloud/JensenSS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SchageS10,
  author    = {Sven Sch{\"{a}}ge and
               J{\"{o}}rg Schwenk},
  title     = {A New RSA-Based Signature Scheme},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  pages     = {1--15},
  year      = {2010},
  crossref  = {DBLP:conf/africacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9\_1},
  doi       = {10.1007/978-3-642-12678-9\_1},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/SchageS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JagerKSS10,
  author    = {Tibor Jager and
               Florian Kohlar and
               Sven Sch{\"{a}}ge and
               J{\"{o}}rg Schwenk},
  title     = {Generic Compilers for Authenticated Key Exchange},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  pages     = {232--249},
  year      = {2010},
  crossref  = {DBLP:conf/asiacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8\_14},
  doi       = {10.1007/978-3-642-17373-8\_14},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/JagerKSS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SchageS10,
  author    = {Sven Sch{\"{a}}ge and
               J{\"{o}}rg Schwenk},
  title     = {A CDH-Based Ring Signature Scheme with Short Signatures and Public
               Keys},
  booktitle = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
               Selected Papers},
  pages     = {129--142},
  year      = {2010},
  crossref  = {DBLP:conf/fc/2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3\_12},
  doi       = {10.1007/978-3-642-14577-3\_12},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fc/SchageS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKSS10,
  author    = {Tibor Jager and
               Florian Kohlar and
               Sven Sch{\"{a}}ge and
               J{\"{o}}rg Schwenk},
  title     = {Generic Compilers for Authenticated Key Exchange (Full Version)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {621},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/621},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JagerKSS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Schage09,
  author    = {Sven Sch{\"{a}}ge},
  title     = {Twin Signature Schemes, Revisited},
  booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  pages     = {104--117},
  year      = {2009},
  crossref  = {DBLP:conf/provsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1\_10},
  doi       = {10.1007/978-3-642-04642-1\_10},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/Schage09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ChenLGS08,
  author    = {Xuan Chen and
               Christoph L{\"{o}}hr and
               Sebastian Gajek and
               Sven Sch{\"{a}}ge},
  title     = {Die Sicherheit von {MS} CardSpace und verwandten Single-Sign-On-Protokollen
               - Browser-basierte Protokolle im Sicherheitscheck},
  journal   = {Datenschutz und Datensicherheit},
  volume    = {32},
  number    = {8},
  pages     = {515--519},
  year      = {2008},
  url       = {https://doi.org/10.1007/s11623-008-0123-7},
  doi       = {10.1007/s11623-008-0123-7},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dud/ChenLGS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/HelbachSS08,
  author    = {J{\"{o}}rg Helbach and
               J{\"{o}}rg Schwenk and
               Sven Sch{\"{a}}ge},
  title     = {Code Voting with Linkable Group Signatures},
  booktitle = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft
               f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in
               Castle Hofen, Bregenz, Austria},
  pages     = {209--208},
  year      = {2008},
  crossref  = {DBLP:conf/ev/2008},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings131/article5071.html},
  timestamp = {Tue, 31 May 2011 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ev/HelbachSS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/GuneysuPS07,
  author    = {Tim G{\"{u}}neysu and
               Christof Paar and
               Sven Sch{\"{a}}ge},
  title     = {Efficient Hash Collision Search Strategies on Special-Purpose Hardware},
  booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
               Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  pages     = {39--51},
  year      = {2007},
  crossref  = {DBLP:conf/weworc/2007},
  url       = {https://doi.org/10.1007/978-3-540-88353-1\_4},
  doi       = {10.1007/978-3-540-88353-1\_4},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/weworc/GuneysuPS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-2,
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9666},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49896-5},
  doi       = {10.1007/978-3-662-49896-5},
  isbn      = {978-3-662-49895-8},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Wed, 11 Apr 2018 11:09:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2015,
  editor    = {Jonathan Katz},
  title     = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9020},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2},
  doi       = {10.1007/978-3-662-46447-2},
  isbn      = {978-3-662-46446-5},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2014,
  editor    = {Ioana Boureanu and
               Philippe Owesarski and
               Serge Vaudenay},
  title     = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8479},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5},
  doi       = {10.1007/978-3-319-07536-5},
  isbn      = {978-3-319-07535-8},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2014,
  editor    = {Hugo Krawczyk},
  title     = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0},
  doi       = {10.1007/978-3-642-54631-0},
  isbn      = {978-3-642-54630-3},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2012,
  editor    = {Reihaneh Safavi{-}Naini and
               Ran Canetti},
  title     = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7417},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5},
  doi       = {10.1007/978-3-642-32009-5},
  isbn      = {978-3-642-32008-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2012,
  editor    = {Marc Fischlin and
               Johannes A. Buchmann and
               Mark Manulis},
  title     = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7293},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8},
  doi       = {10.1007/978-3-642-30057-8},
  isbn      = {978-3-642-30056-1},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2011,
  editor    = {Kenneth G. Paterson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6632},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20465-4},
  doi       = {10.1007/978-3-642-20465-4},
  isbn      = {978-3-642-20464-7},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEcloud/2010,
  title     = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2010,
               Miami, FL, USA, 5-10 July, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5557896},
  isbn      = {978-1-4244-8207-8},
  timestamp = {Thu, 22 Dec 2016 15:12:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcloud/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2010,
  editor    = {Daniel J. Bernstein and
               Tanja Lange},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6055},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9},
  doi       = {10.1007/978-3-642-12678-9},
  isbn      = {978-3-642-12677-2},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2010,
  editor    = {Masayuki Abe},
  title     = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6477},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8},
  doi       = {10.1007/978-3-642-17373-8},
  isbn      = {978-3-642-17372-1},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2010,
  editor    = {Radu Sion},
  title     = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6052},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3},
  doi       = {10.1007/978-3-642-14577-3},
  isbn      = {978-3-642-14576-6},
  timestamp = {Tue, 19 Jun 2018 19:32:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2009,
  editor    = {Josef Pieprzyk and
               Fangguo Zhang},
  title     = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5848},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1},
  doi       = {10.1007/978-3-642-04642-1},
  isbn      = {978-3-642-04641-4},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ev/2008,
  editor    = {Robert Krimmer and
               R{\"{u}}diger Grimm},
  title     = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft
               f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in
               Castle Hofen, Bregenz, Austria},
  series    = {{LNI}},
  volume    = {131},
  publisher = {{GI}},
  year      = {2008},
  isbn      = {978-3-88579-225-3},
  timestamp = {Tue, 17 Feb 2009 14:05:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ev/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/weworc/2007,
  editor    = {Stefan Lucks and
               Ahmad{-}Reza Sadeghi and
               Christopher Wolf},
  title     = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
               Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4945},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-88353-1},
  doi       = {10.1007/978-3-540-88353-1},
  isbn      = {978-3-540-88352-4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/weworc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier