BibTeX records: Kazuki Yoneyama

download as .bib file

@article{DBLP:journals/ieicet/YoneyamaYKKFY18,
  author    = {Kazuki Yoneyama and
               Reo Yoshida and
               Yuto Kawahara and
               Tetsutaro Kobayashi and
               Hitoshi Fuji and
               Tomohide Yamamoto},
  title     = {Exposure-Resilient Identity-Based Dynamic Multi-Cast Key Distribution},
  journal   = {{IEICE} Transactions},
  volume    = {101-A},
  number    = {6},
  pages     = {929--944},
  year      = {2018},
  url       = {https://doi.org/10.1587/transfun.E101.A.929},
  doi       = {10.1587/transfun.E101.A.929},
  timestamp = {Thu, 27 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/YoneyamaYKKFY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Yoneyama18,
  author    = {Kazuki Yoneyama},
  title     = {Formal modeling of random oracle programmability and verification
               of signature unforgeability using task-PIOAs},
  journal   = {Int. J. Inf. Sec.},
  volume    = {17},
  number    = {1},
  pages     = {43--66},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10207-016-0352-y},
  doi       = {10.1007/s10207-016-0352-y},
  timestamp = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/Yoneyama18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SeoEXY18,
  author    = {Jae Hong Seo and
               Keita Emura and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Accumulable optimistic fair exchange from verifiably encrypted homomorphic
               signatures},
  journal   = {Int. J. Inf. Sec.},
  volume    = {17},
  number    = {2},
  pages     = {193--220},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10207-017-0367-z},
  doi       = {10.1007/s10207-017-0367-z},
  timestamp = {Thu, 01 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/SeoEXY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YoneyamaYKKFY18,
  author    = {Kazuki Yoneyama and
               Reo Yoshida and
               Yuto Kawahara and
               Tetsutaro Kobayashi and
               Hitoshi Fuji and
               Tomohide Yamamoto},
  title     = {Multi-cast key distribution: scalable, dynamic and provably secure
               construction},
  journal   = {Int. J. Inf. Sec.},
  volume    = {17},
  number    = {5},
  pages     = {513--532},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10207-017-0389-6},
  doi       = {10.1007/s10207-017-0389-6},
  timestamp = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/YoneyamaYKKFY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/FujiokaTTY18,
  author    = {Atsushi Fujioka and
               Katsuyuki Takashima and
               Shintaro Terada and
               Kazuki Yoneyama},
  title     = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange},
  booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International
               Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
               Papers},
  pages     = {177--195},
  year      = {2018},
  crossref  = {DBLP:conf/icisc/2018},
  url       = {https://doi.org/10.1007/978-3-030-12146-4\_12},
  doi       = {10.1007/978-3-030-12146-4\_12},
  timestamp = {Wed, 23 Jan 2019 14:06:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/FujiokaTTY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/KanaiY18,
  author    = {Yuma Kanai and
               Kazuki Yoneyama},
  title     = {On Hiding Access Timings in {ORAM}},
  booktitle = {International Symposium on Information Theory and Its Applications,
               {ISITA} 2018, Singapore, October 28-31, 2018},
  pages     = {516--519},
  year      = {2018},
  crossref  = {DBLP:conf/isita/2018},
  url       = {https://doi.org/10.23919/ISITA.2018.8664270},
  doi       = {10.23919/ISITA.2018.8664270},
  timestamp = {Thu, 28 Mar 2019 19:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isita/KanaiY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/TeradaY18,
  author    = {Shintaro Terada and
               Kazuki Yoneyama},
  title     = {Improved Verifiable Delegated Private Set Intersection},
  booktitle = {International Symposium on Information Theory and Its Applications,
               {ISITA} 2018, Singapore, October 28-31, 2018},
  pages     = {520--524},
  year      = {2018},
  crossref  = {DBLP:conf/isita/2018},
  url       = {https://doi.org/10.23919/ISITA.2018.8664310},
  doi       = {10.23919/ISITA.2018.8664310},
  timestamp = {Thu, 28 Mar 2019 19:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isita/TeradaY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShiY18,
  author    = {Cheng Shi and
               Kazuki Yoneyama},
  title     = {Verification of {LINE} Encryption Version 1.0 Using ProVerif},
  booktitle = {Advances in Information and Computer Security - 13th International
               Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
               2018, Proceedings},
  pages     = {158--173},
  year      = {2018},
  crossref  = {DBLP:conf/iwsec/2018},
  url       = {https://doi.org/10.1007/978-3-319-97916-8\_11},
  doi       = {10.1007/978-3-319-97916-8\_11},
  timestamp = {Wed, 08 Aug 2018 13:15:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/ShiY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FujiokaY18,
  author    = {Atsushi Fujioka and
               Kazuki Yoneyama},
  title     = {Single Private-Key Generator Security Implies Multiple Private-Key
               Generators Security},
  booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
               South Korea, October 25-28, 2018, Proceedings},
  pages     = {56--74},
  year      = {2018},
  crossref  = {DBLP:conf/provsec/2018},
  url       = {https://doi.org/10.1007/978-3-030-01446-9\_4},
  doi       = {10.1007/978-3-030-01446-9\_4},
  timestamp = {Thu, 11 Oct 2018 15:07:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/FujiokaY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaTTY18,
  author    = {Atsushi Fujioka and
               Katsuyuki Takashima and
               Shintaro Terada and
               Kazuki Yoneyama},
  title     = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {730},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/730},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FujiokaTTY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaTY18,
  author    = {Atsushi Fujioka and
               Katsuyuki Takashima and
               Kazuki Yoneyama},
  title     = {One-Round Authenticated Group Key Exchange from Isogenies},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1033},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1033},
  timestamp = {Tue, 13 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FujiokaTY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ItakuraKY17,
  author    = {Naoto Itakura and
               Kaoru Kurosawa and
               Kazuki Yoneyama},
  title     = {Oblivious Polynomial Evaluation in the Exponent, Revisited},
  journal   = {{IEICE} Transactions},
  volume    = {100-A},
  number    = {1},
  pages     = {26--33},
  year      = {2017},
  url       = {https://doi.org/10.1587/transfun.E100.A.26},
  doi       = {10.1587/transfun.E100.A.26},
  timestamp = {Thu, 27 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/ItakuraKY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama17,
  author    = {Kazuki Yoneyama},
  title     = {Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols},
  journal   = {{IEICE} Transactions},
  volume    = {100-A},
  number    = {9},
  pages     = {1794--1803},
  year      = {2017},
  url       = {https://doi.org/10.1587/transfun.E100.A.1794},
  doi       = {10.1587/transfun.E100.A.1794},
  timestamp = {Thu, 27 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/Yoneyama17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OnoY17,
  author    = {Tomoyoshi Ono and
               Kazuki Yoneyama},
  title     = {On Randomness Exposure Resilience of Group Signatures},
  journal   = {{IEICE} Transactions},
  volume    = {100-D},
  number    = {10},
  pages     = {2357--2367},
  year      = {2017},
  url       = {https://doi.org/10.1587/transinf.2016INP0015},
  doi       = {10.1587/transinf.2016INP0015},
  timestamp = {Thu, 27 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/OnoY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KobayashiYYNHKO17,
  author    = {Yukou Kobayashi and
               Naoto Yanai and
               Kazuki Yoneyama and
               Takashi Nishide and
               Goichiro Hanaoka and
               Kwangjo Kim and
               Eiji Okamoto},
  title     = {Provably Secure Gateway Threshold Password-Based Authenticated Key
               Exchange Secure against Undetectable On-Line Dictionary Attack},
  journal   = {{IEICE} Transactions},
  volume    = {100-A},
  number    = {12},
  pages     = {2991--3006},
  year      = {2017},
  url       = {https://doi.org/10.1587/transfun.E100.A.2991},
  doi       = {10.1587/transfun.E100.A.2991},
  timestamp = {Thu, 27 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/KobayashiYYNHKO17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/YoneyamaH17,
  author    = {Kazuki Yoneyama and
               Goichiro Hanaoka},
  title     = {Compact public key encryption without full random oracles},
  journal   = {Pervasive and Mobile Computing},
  volume    = {41},
  pages     = {286--299},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.pmcj.2016.03.004},
  doi       = {10.1016/j.pmcj.2016.03.004},
  timestamp = {Thu, 26 Oct 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/percom/YoneyamaH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YoneyamaK17,
  author    = {Kazuki Yoneyama and
               Shogo Kimura},
  title     = {Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption
               with Storage Efficiency},
  booktitle = {Information and Communications Security - 19th International Conference,
               {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  pages     = {489--501},
  year      = {2017},
  crossref  = {DBLP:conf/icics/2017},
  url       = {https://doi.org/10.1007/978-3-319-89500-0\_42},
  doi       = {10.1007/978-3-319-89500-0\_42},
  timestamp = {Wed, 18 Apr 2018 10:50:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/YoneyamaK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/Yoneyama16,
  author    = {Kazuki Yoneyama},
  title     = {One-Round Authenticated Key Exchange without Implementation Tricks},
  journal   = {{JIP}},
  volume    = {24},
  number    = {1},
  pages     = {9--19},
  year      = {2016},
  url       = {https://doi.org/10.2197/ipsjjip.24.9},
  doi       = {10.2197/ipsjjip.24.9},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jip/Yoneyama16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/KimuraY16,
  author    = {Shogo Kimura and
               Kazuki Yoneyama},
  title     = {Security proof of identity-based signature under {RSA} assumption,
               reconsidered},
  booktitle = {2016 International Symposium on Information Theory and Its Applications,
               {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages     = {86--90},
  year      = {2016},
  crossref  = {DBLP:conf/isita/2016},
  url       = {http://ieeexplore.ieee.org/document/7840391/},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isita/KimuraY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaSOY16,
  author    = {Kaoru Kurosawa and
               Keisuke Sasaki and
               Kiyohiko Ohta and
               Kazuki Yoneyama},
  title     = {UC-Secure Dynamic Searchable Symmetric Encryption Scheme},
  booktitle = {Advances in Information and Computer Security - 11th International
               Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
               2016, Proceedings},
  pages     = {73--90},
  year      = {2016},
  crossref  = {DBLP:conf/iwsec/2016},
  url       = {https://doi.org/10.1007/978-3-319-44524-3\_5},
  doi       = {10.1007/978-3-319-44524-3\_5},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/KurosawaSOY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaYKKFY16,
  author    = {Kazuki Yoneyama and
               Reo Yoshida and
               Yuto Kawahara and
               Tetsutaro Kobayashi and
               Hitoshi Fuji and
               Tomohide Yamamoto},
  title     = {Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure
               Construction},
  booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
               China, November 10-11, 2016, Proceedings},
  pages     = {207--226},
  year      = {2016},
  crossref  = {DBLP:conf/provsec/2016},
  url       = {https://doi.org/10.1007/978-3-319-47422-9\_12},
  doi       = {10.1007/978-3-319-47422-9\_12},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/YoneyamaYKKFY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/SakuradaYHY16,
  author    = {Hideki Sakurada and
               Kazuki Yoneyama and
               Yoshikazu Hanatani and
               Maki Yoshida},
  title     = {Analyzing and Fixing the {QACCE} Security of {QUIC}},
  booktitle = {Security Standardisation Research - Third International Conference,
               {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  pages     = {1--31},
  year      = {2016},
  crossref  = {DBLP:conf/secsr/2016},
  url       = {https://doi.org/10.1007/978-3-319-49100-4\_1},
  doi       = {10.1007/978-3-319-49100-4\_1},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secsr/SakuradaYHY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoneyamaYKKFY16,
  author    = {Kazuki Yoneyama and
               Reo Yoshida and
               Yuto Kawahara and
               Tetsutaro Kobayashi and
               Hitoshi Fuji and
               Tomohide Yamamoto},
  title     = {Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure
               Construction},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {833},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/833},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/YoneyamaYKKFY16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FujiokaSXY15,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Strongly secure authenticated key exchange from factoring, codes,
               and lattices},
  journal   = {Des. Codes Cryptography},
  volume    = {76},
  number    = {3},
  pages     = {469--504},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-014-9972-2},
  doi       = {10.1007/s10623-014-9972-2},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/FujiokaSXY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama15,
  author    = {Kazuki Yoneyama},
  title     = {Compact Authenticated Key Exchange from Bounded CCA-Secure {KEM}},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {132--143},
  year      = {2015},
  url       = {https://doi.org/10.1587/transfun.E98.A.132},
  doi       = {10.1587/transfun.E98.A.132},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/Yoneyama15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SeoEXY15,
  author    = {Jae Hong Seo and
               Keita Emura and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic
               Signatures},
  booktitle = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  pages     = {192--214},
  year      = {2015},
  crossref  = {DBLP:conf/acns/2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7\_10},
  doi       = {10.1007/978-3-319-28166-7\_10},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/SeoEXY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15,
  author    = {Yukou Kobayashi and
               Naoto Yanai and
               Kazuki Yoneyama and
               Takashi Nishide and
               Goichiro Hanaoka and
               Kwangjo Kim and
               Eiji Okamoto},
  title     = {Gateway Threshold Password-based Authenticated Key Exchange Secure
               against Undetectable On-line Dictionary Attack},
  booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
               on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
               2015.},
  pages     = {39--52},
  year      = {2015},
  crossref  = {DBLP:conf/secrypt/2015},
  url       = {https://doi.org/10.5220/0005539300390052},
  doi       = {10.5220/0005539300390052},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/KobayashiYYNHKO15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama14,
  author    = {Kazuki Yoneyama},
  title     = {Practical and Exposure-Resilient Hierarchical ID-Based Authenticated
               Key Exchange without Random Oracles},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {6},
  pages     = {1335--1344},
  year      = {2014},
  url       = {https://doi.org/10.1587/transfun.E97.A.1335},
  doi       = {10.1587/transfun.E97.A.1335},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/Yoneyama14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SuzukiY14,
  author    = {Koutarou Suzuki and
               Kazuki Yoneyama},
  title     = {Exposure-Resilient One-Round Tripartite Key Exchange without Random
               Oracles},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {6},
  pages     = {1345--1355},
  year      = {2014},
  url       = {https://doi.org/10.1587/transfun.E97.A.1345},
  doi       = {10.1587/transfun.E97.A.1345},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/SuzukiY14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Yoneyama14,
  author    = {Kazuki Yoneyama},
  title     = {Password-Based Authenticated Key Exchange without Centralized Trusted
               Setup},
  booktitle = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  pages     = {19--36},
  year      = {2014},
  crossref  = {DBLP:conf/acns/2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5\_2},
  doi       = {10.1007/978-3-319-07536-5\_2},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/Yoneyama14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NaitoYO14,
  author    = {Yusuke Naito and
               Kazuki Yoneyama and
               Kazuo Ohta},
  title     = {Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass
               Hash Functions},
  booktitle = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  pages     = {235--252},
  year      = {2014},
  crossref  = {DBLP:conf/acns/2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5\_15},
  doi       = {10.1007/978-3-319-07536-5\_15},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/NaitoYO14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/OharaOSY14,
  author    = {Kazuma Ohara and
               Kazuo Ohta and
               Koutarou Suzuki and
               Kazuki Yoneyama},
  title     = {Constant Rounds Almost Linear Complexity Multi-party Computation for
               Prefix Sum},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  pages     = {285--299},
  year      = {2014},
  crossref  = {DBLP:conf/africacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6\_18},
  doi       = {10.1007/978-3-319-06734-6\_18},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/OharaOSY14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SuzukiY14,
  author    = {Koutarou Suzuki and
               Kazuki Yoneyama},
  title     = {Converting PKI-Based Authenticated Key Exchange to Identity-Based},
  booktitle = {Cryptology and Network Security - 13th International Conference, {CANS}
               2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  pages     = {159--174},
  year      = {2014},
  crossref  = {DBLP:conf/cans/2014},
  url       = {https://doi.org/10.1007/978-3-319-12280-9\_11},
  doi       = {10.1007/978-3-319-12280-9\_11},
  timestamp = {Wed, 24 May 2017 08:27:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/SuzukiY14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Yoneyama14,
  author    = {Kazuki Yoneyama},
  title     = {Formal Modeling of Random Oracle Programmability and Verification
               of Signature Unforgeability Using Task-PIOAs},
  booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International
               Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  pages     = {37--52},
  year      = {2014},
  crossref  = {DBLP:conf/icisc/2014},
  url       = {https://doi.org/10.1007/978-3-319-15943-0\_3},
  doi       = {10.1007/978-3-319-15943-0\_3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/Yoneyama14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzukiY14,
  author    = {Koutarou Suzuki and
               Kazuki Yoneyama},
  title     = {Secure Multi-Party Computation for Elliptic Curves},
  booktitle = {Advances in Information and Computer Security - 9th International
               Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
               2014. Proceedings},
  pages     = {98--108},
  year      = {2014},
  crossref  = {DBLP:conf/iwsec/2014},
  url       = {https://doi.org/10.1007/978-3-319-09843-2\_8},
  doi       = {10.1007/978-3-319-09843-2\_8},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/SuzukiY14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaH14,
  author    = {Kazuki Yoneyama and
               Goichiro Hanaoka},
  title     = {Compact Public Key Encryption with Minimum Ideal Property of Hash
               Functions},
  booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong
               Kong, China, October 9-10, 2014. Proceedings},
  pages     = {178--193},
  year      = {2014},
  crossref  = {DBLP:conf/provsec/2014},
  url       = {https://doi.org/10.1007/978-3-319-12475-9\_13},
  doi       = {10.1007/978-3-319-12475-9\_13},
  timestamp = {Fri, 02 Nov 2018 09:49:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/YoneyamaH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Yoneyama14,
  author    = {Kazuki Yoneyama},
  title     = {Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols},
  booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong
               Kong, China, October 9-10, 2014. Proceedings},
  pages     = {317--325},
  year      = {2014},
  crossref  = {DBLP:conf/provsec/2014},
  url       = {https://doi.org/10.1007/978-3-319-12475-9\_23},
  doi       = {10.1007/978-3-319-12475-9\_23},
  timestamp = {Fri, 02 Nov 2018 09:49:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/Yoneyama14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama13,
  author    = {Kazuki Yoneyama},
  title     = {Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated
               Key Exchange without Random Oracles},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {6},
  pages     = {1112--1123},
  year      = {2013},
  url       = {https://doi.org/10.1587/transfun.E96.A.1112},
  doi       = {10.1587/transfun.E96.A.1112},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/Yoneyama13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama13a,
  author    = {Kazuki Yoneyama},
  title     = {One-Round Authenticated Key Exchange with Strong Forward Secrecy in
               the Standard Model against Constrained Adversary},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {6},
  pages     = {1124--1138},
  year      = {2013},
  url       = {https://doi.org/10.1587/transfun.E96.A.1124},
  doi       = {10.1587/transfun.E96.A.1124},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/Yoneyama13a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaHKSUY13,
  author    = {Atsushi Fujioka and
               Fumitaka Hoshino and
               Tetsutaro Kobayashi and
               Koutarou Suzuki and
               Berkant Ustaoglu and
               Kazuki Yoneyama},
  title     = {id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and
               Asymmetric Pairing},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {6},
  pages     = {1139--1155},
  year      = {2013},
  url       = {https://doi.org/10.1587/transfun.E96.A.1139},
  doi       = {10.1587/transfun.E96.A.1139},
  timestamp = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/FujiokaHKSUY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SuzukiY13,
  author    = {Koutarou Suzuki and
               Kazuki Yoneyama},
  title     = {Exposure-Resilient One-Round Tripartite Key Exchange without Random
               Oracles},
  booktitle = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  pages     = {458--474},
  year      = {2013},
  crossref  = {DBLP:conf/acns/2013},
  url       = {https://doi.org/10.1007/978-3-642-38980-1\_29},
  doi       = {10.1007/978-3-642-38980-1\_29},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/SuzukiY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FujiokaSXY13,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Practical and post-quantum authenticated key exchange from one-way
               secure key encapsulation mechanism},
  booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages     = {83--94},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013asia},
  url       = {https://doi.org/10.1145/2484313.2484323},
  doi       = {10.1145/2484313.2484323},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/FujiokaSXY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Yoneyama13,
  author    = {Kazuki Yoneyama},
  title     = {Compact Authenticated Key Exchange from Bounded CCA-Secure {KEM}},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
               on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  pages     = {161--178},
  year      = {2013},
  crossref  = {DBLP:conf/indocrypt/2013},
  url       = {https://doi.org/10.1007/978-3-319-03515-4\_11},
  doi       = {10.1007/978-3-319-03515-4\_11},
  timestamp = {Sun, 17 Dec 2017 22:06:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/Yoneyama13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Yoneyama13,
  author    = {Kazuki Yoneyama},
  title     = {One-Round Authenticated Key Exchange without Implementation Trick},
  booktitle = {Advances in Information and Computer Security - 8th International
               Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
               2013, Proceedings},
  pages     = {272--289},
  year      = {2013},
  crossref  = {DBLP:conf/iwsec/2013},
  url       = {https://doi.org/10.1007/978-3-642-41383-4\_18},
  doi       = {10.1007/978-3-642-41383-4\_18},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/Yoneyama13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yoneyama13,
  author    = {Kazuki Yoneyama},
  title     = {Practical and Exposure-resilient Hierarchical ID-based Authenticated
               Key Exchange without Random Oracles},
  booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  pages     = {518--523},
  year      = {2013},
  crossref  = {DBLP:conf/secrypt/2013},
  url       = {http://ieeexplore.ieee.org/document/7223209/},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/Yoneyama13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaSY12,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Kazuki Yoneyama},
  title     = {Strongly Secure Predicate-Based Authenticated Key Exchange: Definition
               and Constructions},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {40--56},
  year      = {2012},
  url       = {https://doi.org/10.1587/transfun.E95.A.40},
  doi       = {10.1587/transfun.E95.A.40},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/FujiokaSY12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama12,
  author    = {Kazuki Yoneyama},
  title     = {Indifferentiable Security Reconsidered: Role of Scheduling},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {185--195},
  year      = {2012},
  url       = {https://doi.org/10.1587/transfun.E95.A.185},
  doi       = {10.1587/transfun.E95.A.185},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/Yoneyama12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Yoneyama12,
  author    = {Kazuki Yoneyama},
  title     = {One-Round Authenticated Key Exchange with Strong Forward Secrecy in
               the Standard Model against Constrained Adversary},
  booktitle = {Advances in Information and Computer Security - 7th International
               Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
               2012. Proceedings},
  pages     = {69--86},
  year      = {2012},
  crossref  = {DBLP:conf/iwsec/2012},
  url       = {https://doi.org/10.1007/978-3-642-34117-5\_5},
  doi       = {10.1007/978-3-642-34117-5\_5},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/Yoneyama12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FujiokaSXY12,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
               and Lattices},
  booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  pages     = {467--484},
  year      = {2012},
  crossref  = {DBLP:conf/pkc/2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8\_28},
  doi       = {10.1007/978-3-642-30057-8\_28},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/FujiokaSXY12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaSXY12,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
               and Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {211},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/211},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FujiokaSXY12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NaitoYWO11,
  author    = {Yusuke Naito and
               Kazuki Yoneyama and
               Lei Wang and
               Kazuo Ohta},
  title     = {Security of Cryptosystems Using Merkle-Damg{\aa}rd in the Random Oracle
               Model},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {1},
  pages     = {57--70},
  year      = {2011},
  url       = {https://doi.org/10.1587/transfun.E94.A.57},
  doi       = {10.1587/transfun.E94.A.57},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/NaitoYWO11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoneyamaTHO11,
  author    = {Kazuki Yoneyama and
               Masayuki Terada and
               Sadayuki Hongo and
               Kazuo Ohta},
  title     = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile
               Environments},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {6},
  pages     = {1263--1273},
  year      = {2011},
  url       = {https://doi.org/10.1587/transfun.E94.A.1263},
  doi       = {10.1587/transfun.E94.A.1263},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/YoneyamaTHO11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaSY11,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Kazuki Yoneyama},
  title     = {Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral
               Key Leakage},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {6},
  pages     = {1306--1317},
  year      = {2011},
  url       = {https://doi.org/10.1587/transfun.E94.A.1306},
  doi       = {10.1587/transfun.E94.A.1306},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/FujiokaSY11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/UshidaKYO11,
  author    = {Mebae Ushida and
               Yutaka Kawai and
               Kazuki Yoneyama and
               Kazuo Ohta},
  title     = {Proxiable Designated Verifier Signature},
  journal   = {{JIP}},
  volume    = {19},
  pages     = {430--440},
  year      = {2011},
  url       = {https://doi.org/10.2197/ipsjjip.19.430},
  doi       = {10.2197/ipsjjip.19.430},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jip/UshidaKYO11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Yoneyama11,
  author    = {Kazuki Yoneyama},
  title     = {Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated
               Key Exchange without Random Oracles},
  booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  pages     = {467--489},
  year      = {2011},
  crossref  = {DBLP:conf/icisc/2011},
  url       = {https://doi.org/10.1007/978-3-642-31912-9\_31},
  doi       = {10.1007/978-3-642-31912-9\_31},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/Yoneyama11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NaitoYWO11,
  author    = {Yusuke Naito and
               Kazuki Yoneyama and
               Lei Wang and
               Kazuo Ohta},
  title     = {Security of Practical Cryptosystems Using Merkle-Damg{\aa}rd Hash
               Function in the Ideal Cipher Model},
  booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
               China, October 16-18, 2011. Proceedings},
  pages     = {281--296},
  year      = {2011},
  crossref  = {DBLP:conf/provsec/2011},
  url       = {https://doi.org/10.1007/978-3-642-24316-5\_20},
  doi       = {10.1007/978-3-642-24316-5\_20},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/NaitoYWO11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaZ11,
  author    = {Kazuki Yoneyama and
               Yunlei Zhao},
  title     = {Taxonomical Security Consideration of Authenticated Key Exchange Resilient
               to Intermediate Computation Leakage},
  booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
               China, October 16-18, 2011. Proceedings},
  pages     = {348--365},
  year      = {2011},
  crossref  = {DBLP:conf/provsec/2011},
  url       = {https://doi.org/10.1007/978-3-642-24316-5\_25},
  doi       = {10.1007/978-3-642-24316-5\_25},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/YoneyamaZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaiTKYOK10,
  author    = {Yutaka Kawai and
               Shotaro Tanno and
               Takahiro Kondo and
               Kazuki Yoneyama and
               Kazuo Ohta and
               Noboru Kunihiro},
  title     = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone
               Condition},
  journal   = {{IEICE} Transactions},
  volume    = {93-A},
  number    = {6},
  pages     = {1122--1131},
  year      = {2010},
  url       = {https://doi.org/10.1587/transfun.E93.A.1122},
  doi       = {10.1587/transfun.E93.A.1122},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/KawaiTKYOK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YoneyamaUO10,
  author    = {Kazuki Yoneyama and
               Mebae Ushida and
               Kazuo Ohta},
  title     = {Rigorous Security Requirements for Designated Verifier Signatures},
  booktitle = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  pages     = {318--335},
  year      = {2010},
  crossref  = {DBLP:conf/cisc/2010},
  url       = {https://doi.org/10.1007/978-3-642-21518-6\_22},
  doi       = {10.1007/978-3-642-21518-6\_22},
  timestamp = {Mon, 22 May 2017 17:10:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/YoneyamaUO10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/UshidaKYO10,
  author    = {Mebae Ushida and
               Yutaka Kawai and
               Kazuki Yoneyama and
               Kazuo Ohta},
  title     = {Proxiable Designated Verifier Signature},
  booktitle = {e-Business and Telecommunications - 7th International Joint Conference,
               {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  pages     = {220--232},
  year      = {2010},
  crossref  = {DBLP:conf/icete/2010s},
  url       = {https://doi.org/10.1007/978-3-642-25206-8\_14},
  doi       = {10.1007/978-3-642-25206-8\_14},
  timestamp = {Tue, 29 May 2018 14:10:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icete/UshidaKYO10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Yoneyama10,
  author    = {Kazuki Yoneyama},
  title     = {Indifferentiable Security Reconsidered: Role of Scheduling},
  booktitle = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  pages     = {430--444},
  year      = {2010},
  crossref  = {DBLP:conf/isw/2010},
  url       = {https://doi.org/10.1007/978-3-642-18178-8\_36},
  doi       = {10.1007/978-3-642-18178-8\_36},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/Yoneyama10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YoneyamaTHO10,
  author    = {Kazuki Yoneyama and
               Masayuki Terada and
               Sadayuki Hongo and
               Kazuo Ohta},
  title     = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile
               Environments},
  booktitle = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Short Paper Proceedings},
  pages     = {42--59},
  year      = {2010},
  crossref  = {DBLP:conf/iwsec/2010s},
  timestamp = {Thu, 15 Sep 2011 15:14:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/YoneyamaTHO10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FujiokaSY10,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Kazuki Yoneyama},
  title     = {Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral
               Key Leakage},
  booktitle = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  pages     = {164--180},
  year      = {2010},
  crossref  = {DBLP:conf/iwsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-16825-3\_12},
  doi       = {10.1007/978-3-642-16825-3\_12},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/FujiokaSY10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/Yoneyama10,
  author    = {Kazuki Yoneyama},
  title     = {Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange},
  booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
               Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  pages     = {147--166},
  year      = {2010},
  crossref  = {DBLP:conf/pairing/2010},
  url       = {https://doi.org/10.1007/978-3-642-17455-1\_10},
  doi       = {10.1007/978-3-642-17455-1\_10},
  timestamp = {Mon, 22 May 2017 17:11:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pairing/Yoneyama10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UshidaOKY10,
  author    = {Mebae Ushida and
               Kazuo Ohta and
               Yutaka Kawai and
               Kazuki Yoneyama},
  title     = {Proxiable Designated Verifier Signature},
  booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
               and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  pages     = {344--353},
  year      = {2010},
  crossref  = {DBLP:conf/secrypt/2010},
  timestamp = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/UshidaOKY10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FujiokaSY10,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Kazuki Yoneyama},
  title     = {Predicate-Based Authenticated Key Exchange Resilient to Ephemeral
               Key Leakage},
  booktitle = {Information Security Applications - 11th International Workshop, {WISA}
               2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  pages     = {15--30},
  year      = {2010},
  crossref  = {DBLP:conf/wisa/2010},
  url       = {https://doi.org/10.1007/978-3-642-17955-6\_2},
  doi       = {10.1007/978-3-642-17955-6\_2},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/FujiokaSY10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Yoneyama10,
  author    = {Kazuki Yoneyama},
  title     = {Cross-Realm Password-Based Server Aided Key Exchange},
  booktitle = {Information Security Applications - 11th International Workshop, {WISA}
               2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  pages     = {322--336},
  year      = {2010},
  crossref  = {DBLP:conf/wisa/2010},
  url       = {https://doi.org/10.1007/978-3-642-17955-6\_24},
  doi       = {10.1007/978-3-642-17955-6\_24},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/Yoneyama10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishideYO09,
  author    = {Takashi Nishide and
               Kazuki Yoneyama and
               Kazuo Ohta},
  title     = {Attribute-Based Encryption with Partially Hidden Ciphertext Policies},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {1},
  pages     = {22--32},
  year      = {2009},
  url       = {https://doi.org/10.1587/transfun.E92.A.22},
  doi       = {10.1587/transfun.E92.A.22},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/NishideYO09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama09,
  author    = {Kazuki Yoneyama},
  title     = {Does Secure Password-Based Authenticated Key Exchange against Leakage
               of Internal States Exist?},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {1},
  pages     = {113--121},
  year      = {2009},
  url       = {https://doi.org/10.1587/transfun.E92.A.113},
  doi       = {10.1587/transfun.E92.A.113},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/Yoneyama09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoneyamaMO09,
  author    = {Kazuki Yoneyama and
               Satoshi Miyagawa and
               Kazuo Ohta},
  title     = {Leaky Random Oracle},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {8},
  pages     = {1795--1807},
  year      = {2009},
  url       = {https://doi.org/10.1587/transfun.E92.A.1795},
  doi       = {10.1587/transfun.E92.A.1795},
  timestamp = {Sat, 29 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/YoneyamaMO09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/Yoneyama09,
  author    = {Kazuki Yoneyama},
  title     = {Efficient and Strongly Secure Password-based Server Aided Key Exchange},
  journal   = {{JIP}},
  volume    = {17},
  pages     = {202--215},
  year      = {2009},
  url       = {https://doi.org/10.2197/ipsjjip.17.202},
  doi       = {10.2197/ipsjjip.17.202},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jip/Yoneyama09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaitoYWO09,
  author    = {Yusuke Naito and
               Kazuki Yoneyama and
               Lei Wang and
               Kazuo Ohta},
  title     = {How to Confirm Cryptosystems Security: The Original Merkle-Damg{\aa}rd
               Is Still Alive!},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {382--398},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7\_23},
  doi       = {10.1007/978-3-642-10366-7\_23},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/NaitoYWO09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KawaiYO09,
  author    = {Yutaka Kawai and
               Kazuki Yoneyama and
               Kazuo Ohta},
  title     = {Secret Handshake: Strong Anonymity Definition and Construction},
  booktitle = {Information Security Practice and Experience, 5th International Conference,
               {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  pages     = {219--229},
  year      = {2009},
  crossref  = {DBLP:conf/ispec/2009},
  url       = {https://doi.org/10.1007/978-3-642-00843-6\_20},
  doi       = {10.1007/978-3-642-00843-6\_20},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/KawaiYO09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoYWO09,
  author    = {Yusuke Naito and
               Kazuki Yoneyama and
               Lei Wang and
               Kazuo Ohta},
  title     = {How to Prove the Security of Practical Cryptosystems with Merkle-Damg{\aa}rd
               Hashing by Adopting Indifferentiability},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {40},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/040},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/NaitoYWO09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoYWO09a,
  author    = {Yusuke Naito and
               Kazuki Yoneyama and
               Lei Wang and
               Kazuo Ohta},
  title     = {Security of Practical Cryptosystems Using Merkle-Damgard Hash Function
               in the Ideal Cipher Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {75},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/075},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/NaitoYWO09a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawaiYO09,
  author    = {Yutaka Kawai and
               Kazuki Yoneyama and
               Kazuo Ohta},
  title     = {Secret Handshake: Strong Anonymity Definition and Construction},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {148},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/148},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KawaiYO09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NishideYO08,
  author    = {Takashi Nishide and
               Kazuki Yoneyama and
               Kazuo Ohta},
  title     = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified
               Access Structures},
  booktitle = {Applied Cryptography and Network Security, 6th International Conference,
               {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  pages     = {111--129},
  year      = {2008},
  crossref  = {DBLP:conf/acns/2008},
  url       = {https://doi.org/10.1007/978-3-540-68914-0\_7},
  doi       = {10.1007/978-3-540-68914-0\_7},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/NishideYO08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Yoneyama08,
  author    = {Kazuki Yoneyama},
  title     = {Efficient and Strongly Secure Password-Based Server Aided Key Exchange
               (Extended Abstract)},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
               on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  pages     = {172--184},
  year      = {2008},
  crossref  = {DBLP:conf/indocrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-89754-5\_14},
  doi       = {10.1007/978-3-540-89754-5\_14},
  timestamp = {Wed, 20 Dec 2017 19:55:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/Yoneyama08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaMO08,
  author    = {Kazuki Yoneyama and
               Satoshi Miyagawa and
               Kazuo Ohta},
  title     = {Leaky Random Oracle (Extended Abstract)},
  booktitle = {Provable Security, Second International Conference, ProvSec 2008,
               Shanghai, China, October 30 - November 1, 2008. Proceedings},
  pages     = {226--240},
  year      = {2008},
  crossref  = {DBLP:conf/provsec/2008},
  url       = {https://doi.org/10.1007/978-3-540-88733-1\_16},
  doi       = {10.1007/978-3-540-88733-1\_16},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/YoneyamaMO08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yoneyama08,
  author    = {Kazuki Yoneyama},
  title     = {Anonymous Message Authentication - Universally Composable Definition
               and Construction},
  booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security
               and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  pages     = {351--354},
  year      = {2008},
  crossref  = {DBLP:conf/secrypt/2008},
  timestamp = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/Yoneyama08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KawaiTKYKO08,
  author    = {Yutaka Kawai and
               Shotaro Tanno and
               Takahiro Kondo and
               Kazuki Yoneyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone
               Condition},
  booktitle = {Information Security Applications, 9th International Workshop, {WISA}
               2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
               Papers},
  pages     = {160--173},
  year      = {2008},
  crossref  = {DBLP:conf/wisa/2008},
  url       = {https://doi.org/10.1007/978-3-642-00306-6\_12},
  doi       = {10.1007/978-3-642-00306-6\_12},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/KawaiTKYKO08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OtaYKTO07,
  author    = {Haruki Ota and
               Kazuki Yoneyama and
               Shinsaku Kiyomoto and
               Toshiaki Tanaka and
               Kazuo Ohta},
  title     = {Universally Composable Hierarchical Hybrid Authenticated Key Exchange},
  journal   = {{IEICE} Transactions},
  volume    = {90-A},
  number    = {1},
  pages     = {139--151},
  year      = {2007},
  url       = {https://doi.org/10.1093/ietfec/e90-a.1.139},
  doi       = {10.1093/ietfec/e90-a.1.139},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/OtaYKTO07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/YoneyamaOO07,
  author    = {Kazuki Yoneyama and
               Haruki Ota and
               Kazuo Ohta},
  title     = {Secure Cross-Realm Client-to-Client Password-Based Authenticated Key
               Exchange Against Undetectable On-Line Dictionary Attacks},
  booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
               17th International Symposium, AAECC-17, Bangalore, India, December
               16-20, 2007, Proceedings},
  pages     = {257--266},
  year      = {2007},
  crossref  = {DBLP:conf/aaecc/2007},
  url       = {https://doi.org/10.1007/978-3-540-77224-8\_30},
  doi       = {10.1007/978-3-540-77224-8\_30},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aaecc/YoneyamaOO07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YoneyamaO07,
  author    = {Kazuki Yoneyama and
               Kazuo Ohta},
  title     = {Ring signatures: universally composable definitions and constructions},
  booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages     = {374--376},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007asia},
  url       = {https://doi.org/10.1145/1229285.1229332},
  doi       = {10.1145/1229285.1229332},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/YoneyamaO07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TeradaYHO07,
  author    = {Masayuki Terada and
               Kazuki Yoneyama and
               Sadayuki Hongo and
               Kazuo Ohta},
  title     = {Modeling Agreement Problems in the Universal Composability Framework},
  booktitle = {Information and Communications Security, 9th International Conference,
               {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  pages     = {350--361},
  year      = {2007},
  crossref  = {DBLP:conf/icics/2007},
  url       = {https://doi.org/10.1007/978-3-540-77048-0\_27},
  doi       = {10.1007/978-3-540-77048-0\_27},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/TeradaYHO07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IwamotoWYKO06,
  author    = {Mitsugu Iwamoto and
               Lei Wang and
               Kazuki Yoneyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Visual Secret Sharing Schemes for Multiple Secret Images Allowing
               the Rotation of Shares},
  journal   = {{IEICE} Transactions},
  volume    = {89-A},
  number    = {5},
  pages     = {1382--1395},
  year      = {2006},
  url       = {https://doi.org/10.1093/ietfec/e89-a.5.1382},
  doi       = {10.1093/ietfec/e89-a.5.1382},
  timestamp = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/IwamotoWYKO06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2018,
  editor    = {Kwangsu Lee},
  title     = {Information Security and Cryptology - {ICISC} 2018 - 21st International
               Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11396},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-12146-4},
  doi       = {10.1007/978-3-030-12146-4},
  isbn      = {978-3-030-12145-7},
  timestamp = {Wed, 23 Jan 2019 14:06:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isita/2018,
  title     = {International Symposium on Information Theory and Its Applications,
               {ISITA} 2018, Singapore, October 28-31, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8660385},
  isbn      = {978-4-88552-318-2},
  timestamp = {Thu, 28 Mar 2019 19:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isita/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2018,
  editor    = {Atsuo Inomata and
               Kan Yasuda},
  title     = {Advances in Information and Computer Security - 13th International
               Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
               2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11049},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-97916-8},
  doi       = {10.1007/978-3-319-97916-8},
  isbn      = {978-3-319-97915-1},
  timestamp = {Wed, 08 Aug 2018 13:15:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2018,
  editor    = {Joonsang Baek and
               Willy Susilo and
               Jongkil Kim},
  title     = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
               South Korea, October 25-28, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11192},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-01446-9},
  doi       = {10.1007/978-3-030-01446-9},
  isbn      = {978-3-030-01445-2},
  timestamp = {Thu, 11 Oct 2018 15:07:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2017,
  editor    = {Sihan Qing and
               Chris Mitchell and
               Liqun Chen and
               Dongmei Liu},
  title     = {Information and Communications Security - 19th International Conference,
               {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10631},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-89500-0},
  doi       = {10.1007/978-3-319-89500-0},
  isbn      = {978-3-319-89499-7},
  timestamp = {Wed, 18 Apr 2018 10:50:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isita/2016,
  title     = {2016 International Symposium on Information Theory and Its Applications,
               {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7827540},
  isbn      = {978-4-88552-309-0},
  timestamp = {Mon, 13 Feb 2017 08:31:08 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isita/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2016,
  editor    = {Kazuto Ogawa and
               Katsunari Yoshioka},
  title     = {Advances in Information and Computer Security - 11th International
               Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
               2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9836},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-44524-3},
  doi       = {10.1007/978-3-319-44524-3},
  isbn      = {978-3-319-44523-6},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2016,
  editor    = {Liqun Chen and
               Jinguang Han},
  title     = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
               China, November 10-11, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10005},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-47422-9},
  doi       = {10.1007/978-3-319-47422-9},
  isbn      = {978-3-319-47421-2},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secsr/2016,
  editor    = {Lidong Chen and
               David A. McGrew and
               Chris J. Mitchell},
  title     = {Security Standardisation Research - Third International Conference,
               {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10074},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49100-4},
  doi       = {10.1007/978-3-319-49100-4},
  isbn      = {978-3-319-49099-1},
  timestamp = {Sun, 21 May 2017 00:17:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secsr/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2015,
  editor    = {Tal Malkin and
               Vladimir Kolesnikov and
               Allison Bishop Lewko and
               Michalis Polychronakis},
  title     = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9092},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7},
  doi       = {10.1007/978-3-319-28166-7},
  isbn      = {978-3-319-28165-0},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2015,
  editor    = {Mohammad S. Obaidat and
               Pascal Lorenz and
               Pierangela Samarati},
  title     = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
               on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
               2015},
  publisher = {SciTePress},
  year      = {2015},
  isbn      = {978-989-758-117-5},
  timestamp = {Thu, 06 Aug 2015 12:56:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2014,
  editor    = {Ioana Boureanu and
               Philippe Owesarski and
               Serge Vaudenay},
  title     = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8479},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5},
  doi       = {10.1007/978-3-319-07536-5},
  isbn      = {978-3-319-07535-8},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2014,
  editor    = {David Pointcheval and
               Damien Vergnaud},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8469},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6},
  doi       = {10.1007/978-3-319-06734-6},
  isbn      = {978-3-319-06733-9},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2014,
  editor    = {Dimitris Gritzalis and
               Aggelos Kiayias and
               Ioannis G. Askoxylakis},
  title     = {Cryptology and Network Security - 13th International Conference, {CANS}
               2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8813},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12280-9},
  doi       = {10.1007/978-3-319-12280-9},
  isbn      = {978-3-319-12279-3},
  timestamp = {Wed, 24 May 2017 08:27:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2014,
  editor    = {Jooyoung Lee and
               Jongsung Kim},
  title     = {Information Security and Cryptology - {ICISC} 2014 - 17th International
               Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8949},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-15943-0},
  doi       = {10.1007/978-3-319-15943-0},
  isbn      = {978-3-319-15942-3},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2014,
  editor    = {Maki Yoshida and
               Koichi Mouri},
  title     = {Advances in Information and Computer Security - 9th International
               Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
               2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8639},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-09843-2},
  doi       = {10.1007/978-3-319-09843-2},
  isbn      = {978-3-319-09842-5},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2014,
  editor    = {Sherman S. M. Chow and
               Joseph K. Liu and
               Lucas Chi Kwong Hui and
               Siu{-}Ming Yiu},
  title     = {Provable Security - 8th International Conference, ProvSec 2014, Hong
               Kong, China, October 9-10, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8782},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12475-9},
  doi       = {10.1007/978-3-319-12475-9},
  isbn      = {978-3-319-12474-2},
  timestamp = {Fri, 02 Nov 2018 09:49:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2013,
  editor    = {Michael J. Jacobson Jr. and
               Michael E. Locasto and
               Payman Mohassel and
               Reihaneh Safavi{-}Naini},
  title     = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7954},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38980-1},
  doi       = {10.1007/978-3-642-38980-1},
  isbn      = {978-3-642-38979-5},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013asia,
  editor    = {Kefei Chen and
               Qi Xie and
               Weidong Qiu and
               Ninghui Li and
               Wen{-}Guey Tzeng},
  title     = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2484313},
  isbn      = {978-1-4503-1767-2},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2013,
  editor    = {Goutam Paul and
               Serge Vaudenay},
  title     = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
               on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8250},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-03515-4},
  doi       = {10.1007/978-3-319-03515-4},
  isbn      = {978-3-319-03514-7},
  timestamp = {Sun, 17 Dec 2017 22:06:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2013,
  editor    = {Kazuo Sakiyama and
               Masayuki Terada},
  title     = {Advances in Information and Computer Security - 8th International
               Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
               2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8231},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41383-4},
  doi       = {10.1007/978-3-642-41383-4},
  isbn      = {978-3-642-41382-7},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2013,
  editor    = {Pierangela Samarati},
  title     = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  publisher = {SciTePress},
  year      = {2013},
  isbn      = {978-989-8565-73-0},
  timestamp = {Tue, 05 Nov 2013 12:35:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2012,
  editor    = {Goichiro Hanaoka and
               Toshihiro Yamauchi},
  title     = {Advances in Information and Computer Security - 7th International
               Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
               2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7631},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34117-5},
  doi       = {10.1007/978-3-642-34117-5},
  isbn      = {978-3-642-34116-8},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2012,
  editor    = {Marc Fischlin and
               Johannes A. Buchmann and
               Mark Manulis},
  title     = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7293},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8},
  doi       = {10.1007/978-3-642-30057-8},
  isbn      = {978-3-642-30056-1},
  timestamp = {Fri, 02 Nov 2018 09:42:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2011,
  editor    = {Howon Kim},
  title     = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7259},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31912-9},
  doi       = {10.1007/978-3-642-31912-9},
  isbn      = {978-3-642-31911-2},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2011,
  editor    = {Xavier Boyen and
               Xiaofeng Chen},
  title     = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
               China, October 16-18, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6980},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-24316-5},
  doi       = {10.1007/978-3-642-24316-5},
  isbn      = {978-3-642-24315-8},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2010,
  editor    = {Xuejia Lai and
               Moti Yung and
               Dongdai Lin},
  title     = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6584},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21518-6},
  doi       = {10.1007/978-3-642-21518-6},
  isbn      = {978-3-642-21517-9},
  timestamp = {Mon, 22 May 2017 17:10:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icete/2010s,
  editor    = {Mohammad S. Obaidat and
               George A. Tsihrintzis and
               Joaquim Filipe},
  title     = {e-Business and Telecommunications - 7th International Joint Conference,
               {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series    = {Communications in Computer and Information Science},
  volume    = {222},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-25206-8},
  doi       = {10.1007/978-3-642-25206-8},
  isbn      = {978-3-642-25205-1},
  timestamp = {Tue, 29 May 2018 14:10:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icete/2010s},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2010,
  editor    = {Mike Burmester and
               Gene Tsudik and
               Spyros S. Magliveras and
               Ivana Ilic},
  title     = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6531},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-18178-8},
  doi       = {10.1007/978-3-642-18178-8},
  isbn      = {978-3-642-18177-1},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010s,
  editor    = {Isao Echizen and
               Noboru Kunihiro and
               Ry{\^{o}}ichi Sasaki},
  title     = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Short Paper Proceedings},
  publisher = {Information Processing Society of Japan {(IPSJ)}},
  year      = {2010},
  isbn      = {978-4-915256-78-3},
  timestamp = {Thu, 15 Sep 2011 15:14:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2010s},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010,
  editor    = {Isao Echizen and
               Noboru Kunihiro and
               Ry{\^{o}}ichi Sasaki},
  title     = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6434},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16825-3},
  doi       = {10.1007/978-3-642-16825-3},
  isbn      = {978-3-642-16824-6},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2010,
  editor    = {Marc Joye and
               Atsuko Miyaji and
               Akira Otsuka},
  title     = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
               Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6487},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17455-1},
  doi       = {10.1007/978-3-642-17455-1},
  isbn      = {978-3-642-17454-4},
  timestamp = {Mon, 22 May 2017 17:11:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pairing/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2010,
  editor    = {Sokratis K. Katsikas and
               Pierangela Samarati},
  title     = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
               and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  publisher = {SciTePress},
  year      = {2010},
  isbn      = {978-989-8425-18-8},
  timestamp = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2010,
  editor    = {Yongwha Chung and
               Moti Yung},
  title     = {Information Security Applications - 11th International Workshop, {WISA}
               2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6513},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-17955-6},
  doi       = {10.1007/978-3-642-17955-6},
  isbn      = {978-3-642-17954-9},
  timestamp = {Sun, 21 May 2017 00:17:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2009,
  editor    = {Mitsuru Matsui},
  title     = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5912},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7},
  doi       = {10.1007/978-3-642-10366-7},
  isbn      = {978-3-642-10365-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2009,
  editor    = {Feng Bao and
               Hui Li and
               Guilin Wang},
  title     = {Information Security Practice and Experience, 5th International Conference,
               {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5451},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00843-6},
  doi       = {10.1007/978-3-642-00843-6},
  isbn      = {978-3-642-00842-9},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2008,
  editor    = {Steven M. Bellovin and
               Rosario Gennaro and
               Angelos D. Keromytis and
               Moti Yung},
  title     = {Applied Cryptography and Network Security, 6th International Conference,
               {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5037},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-68914-0},
  doi       = {10.1007/978-3-540-68914-0},
  isbn      = {978-3-540-68913-3},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2008,
  editor    = {Dipanwita Roy Chowdhury and
               Vincent Rijmen and
               Abhijit Das},
  title     = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
               on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5365},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89754-5},
  doi       = {10.1007/978-3-540-89754-5},
  isbn      = {978-3-540-89753-8},
  timestamp = {Wed, 20 Dec 2017 19:55:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2008,
  editor    = {Joonsang Baek and
               Feng Bao and
               Kefei Chen and
               Xuejia Lai},
  title     = {Provable Security, Second International Conference, ProvSec 2008,
               Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5324},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-88733-1},
  doi       = {10.1007/978-3-540-88733-1},
  isbn      = {978-3-540-88732-4},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2008,
  editor    = {Eduardo Fern{\'{a}}ndez{-}Medina and
               Manu Malek and
               Javier Hernando},
  title     = {{SECRYPT} 2008, Proceedings of the International Conference on Security
               and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  publisher = {{INSTICC} Press},
  year      = {2008},
  isbn      = {978-989-8111-59-3},
  timestamp = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2008,
  editor    = {Kyo{-}Il Chung and
               Kiwook Sohn and
               Moti Yung},
  title     = {Information Security Applications, 9th International Workshop, {WISA}
               2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5379},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00306-6},
  doi       = {10.1007/978-3-642-00306-6},
  isbn      = {978-3-642-00305-9},
  timestamp = {Sun, 21 May 2017 00:17:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisa/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aaecc/2007,
  editor    = {Serdar Boztas and
               Hsiao{-}feng Lu},
  title     = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
               17th International Symposium, AAECC-17, Bangalore, India, December
               16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4851},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77224-8},
  doi       = {10.1007/978-3-540-77224-8},
  isbn      = {978-3-540-77223-1},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aaecc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007asia,
  editor    = {Feng Bao and
               Steven Miller},
  title     = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {1-59593-574-6},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2007asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2007,
  editor    = {Sihan Qing and
               Hideki Imai and
               Guilin Wang},
  title     = {Information and Communications Security, 9th International Conference,
               {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4861},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-77048-0},
  doi       = {10.1007/978-3-540-77048-0},
  isbn      = {978-3-540-77047-3},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier