BibTeX records: Ni Trieu

download as .bib file

@inproceedings{DBLP:conf/crypto/HoangTT18,
  author    = {Viet Tung Hoang and
               Stefano Tessaro and
               Ni Trieu},
  title     = {The Curse of Small Domains: New Attacks on Format-Preserving Encryption},
  booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {I}},
  pages     = {221--251},
  year      = {2018},
  crossref  = {DBLP:conf/crypto/2018-1},
  url       = {https://doi.org/10.1007/978-3-319-96884-1\_8},
  doi       = {10.1007/978-3-319-96884-1\_8},
  timestamp = {Mon, 13 Aug 2018 13:56:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/HoangTT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangTT18,
  author    = {Viet Tung Hoang and
               Stefano Tessaro and
               Ni Trieu},
  title     = {The Curse of Small Domains: New Attacks on Format-Preserving Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {556},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/556},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HoangTT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemmlerRRT18,
  author    = {Daniel Demmler and
               Peter Rindal and
               Mike Rosulek and
               Ni Trieu},
  title     = {{PIR-PSI:} Scaling Private Contact Discovery},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {579},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/579},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DemmlerRRT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolesnikovNRTT17,
  author    = {Vladimir Kolesnikov and
               Jesper Buus Nielsen and
               Mike Rosulek and
               Ni Trieu and
               Roberto Trifiletti},
  title     = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {3--20},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {http://doi.acm.org/10.1145/3133956.3133991},
  doi       = {10.1145/3133956.3133991},
  timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KolesnikovNRTT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolesnikovMPRT17,
  author    = {Vladimir Kolesnikov and
               Naor Matania and
               Benny Pinkas and
               Mike Rosulek and
               Ni Trieu},
  title     = {Practical Multi-party Private Set Intersection from Symmetric-Key
               Techniques},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {1257--1272},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {http://doi.acm.org/10.1145/3133956.3134065},
  doi       = {10.1145/3133956.3134065},
  timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KolesnikovMPRT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovNRTT17,
  author    = {Vladimir Kolesnikov and
               Jesper Buus Nielsen and
               Mike Rosulek and
               Ni Trieu and
               Roberto Trifiletti},
  title     = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {344},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/344},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KolesnikovNRTT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovMPRT17,
  author    = {Vladimir Kolesnikov and
               Naor Matania and
               Benny Pinkas and
               Mike Rosulek and
               Ni Trieu},
  title     = {Practical Multi-party Private Set Intersection from Symmetric-Key
               Techniques},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {799},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/799},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KolesnikovMPRT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovRT17,
  author    = {Vladimir Kolesnikov and
               Mike Rosulek and
               Ni Trieu},
  title     = {SWiM: Secure Wildcard Pattern Matching From {OT} Extension},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1150},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1150},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KolesnikovRT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolesnikovKRT16,
  author    = {Vladimir Kolesnikov and
               Ranjit Kumaresan and
               Mike Rosulek and
               Ni Trieu},
  title     = {Efficient Batched Oblivious {PRF} with Applications to Private Set
               Intersection},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {818--829},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {http://doi.acm.org/10.1145/2976749.2978381},
  doi       = {10.1145/2976749.2978381},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KolesnikovKRT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovKRT16,
  author    = {Vladimir Kolesnikov and
               Ranjit Kumaresan and
               Mike Rosulek and
               Ni Trieu},
  title     = {Efficient Batched Oblivious {PRF} with Applications to Private Set
               Intersection},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {799},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/799},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KolesnikovKRT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2018-1,
  editor    = {Hovav Shacham and
               Alexandra Boldyreva},
  title     = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10991},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-96884-1},
  doi       = {10.1007/978-3-319-96884-1},
  isbn      = {978-3-319-96883-4},
  timestamp = {Mon, 13 Aug 2018 13:56:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier