default search action
Search dblp for Publications
export results for "stream:streams/conf/pkc:"
@inproceedings{DBLP:conf/pkc/AlamatiM24, author = {Navid Alamati and Varun Maram}, editor = {Qiang Tang and Vanessa Teague}, title = {Quantum CCA-Secure PKE, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {193--226}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_7}, doi = {10.1007/978-3-031-57728-4\_7}, timestamp = {Mon, 13 May 2024 08:20:10 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AlamatiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BadertscherMMW24, author = {Christian Badertscher and Monosij Maitra and Christian Matt and Hendrik Waldner}, editor = {Qiang Tang and Vanessa Teague}, title = {Updatable Policy-Compliant Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {105--132}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_4}, doi = {10.1007/978-3-031-57718-5\_4}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BadertscherMMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaldiBPSWW24, author = {Marco Baldi and Sebastian Bitzer and Alessio Pavoni and Paolo Santini and Antonia Wachter{-}Zeh and Violetta Weger}, editor = {Qiang Tang and Vanessa Teague}, title = {Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {243--274}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_8}, doi = {10.1007/978-3-031-57722-2\_8}, timestamp = {Mon, 13 May 2024 08:20:05 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BaldiBPSWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaldimtsiKR24, author = {Foteini Baldimtsi and Ioanna Karantaidou and Srinivasan Raghuraman}, editor = {Qiang Tang and Vanessa Teague}, title = {Oblivious Accumulators}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {99--131}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_4}, doi = {10.1007/978-3-031-57722-2\_4}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BaldimtsiKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BartoliC24, author = {Claudia Bartoli and Ignacio Cascudo}, editor = {Qiang Tang and Vanessa Teague}, title = {On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {426--457}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_14}, doi = {10.1007/978-3-031-57722-2\_14}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BartoliC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BauerFR24, author = {Balthazar Bauer and Georg Fuchsbauer and Fabian Regen}, editor = {Qiang Tang and Vanessa Teague}, title = {On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {3--36}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_1}, doi = {10.1007/978-3-031-57718-5\_1}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BauerFR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BenzBEGMM24, author = {Laurin Benz and Wasilij Beskorovajnov and Sarai Eilebrecht and Roland Gr{\"{o}}ll and Maximilian M{\"{u}}ller and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Qiang Tang and Vanessa Teague}, title = {Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {257--288}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_9}, doi = {10.1007/978-3-031-57728-4\_9}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BenzBEGMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BhimrajkaCV24, author = {Nidhish Bhimrajka and Ashish Choudhury and Supreeth Varadarajan}, editor = {Qiang Tang and Vanessa Teague}, title = {Network-Agnostic Multi-party Computation Revisited (Extended Abstract)}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {171--204}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_6}, doi = {10.1007/978-3-031-57722-2\_6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BhimrajkaCV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BhushanOPR24, author = {Kaartik Bhushan and Sai Lakshmi Bhavana Obbattu and Manoj Prabhakaran and Rajeev Raghunath}, editor = {Qiang Tang and Vanessa Teague}, title = {{R3PO:} Reach-Restricted Reactive Program Obfuscation and Its Applications}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {61--91}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_3}, doi = {10.1007/978-3-031-57725-3\_3}, timestamp = {Mon, 13 May 2024 08:20:08 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BhushanOPR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BolboceanuBS24, author = {Madalina Bolboceanu and Zvika Brakerski and Devika Sharma}, editor = {Qiang Tang and Vanessa Teague}, title = {On Algebraic Embedding for Unstructured Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {123--154}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_5}, doi = {10.1007/978-3-031-57725-3\_5}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BolboceanuBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrancoDSZ24, author = {Pedro Branco and Nico D{\"{o}}ttling and Akshayaram Srinivasan and Riccardo Zanotto}, editor = {Qiang Tang and Vanessa Teague}, title = {Rate-1 Fully Local Somewhere Extractable Hashing from {DDH}}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {356--386}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_12}, doi = {10.1007/978-3-031-57725-3\_12}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrancoDSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrunettaHS24, author = {Carlo Brunetta and Hans Heum and Martijn Stam}, editor = {Qiang Tang and Vanessa Teague}, title = {SoK: Public Key Encryption with Openings}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {35--68}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_2}, doi = {10.1007/978-3-031-57728-4\_2}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrunettaHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CampanelliFFLL24, author = {Matteo Campanelli and Antonio Faonio and Dario Fiore and Tianyu Li and Helger Lipmaa}, editor = {Qiang Tang and Vanessa Teague}, title = {Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {337--369}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_11}, doi = {10.1007/978-3-031-57722-2\_11}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CampanelliFFLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CampanelliFK24, author = {Matteo Campanelli and Dario Fiore and Hamidreza Khoshakhlagh}, editor = {Qiang Tang and Vanessa Teague}, title = {Witness Encryption for Succinct Functional Commitments and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {132--167}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_5}, doi = {10.1007/978-3-031-57722-2\_5}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CampanelliFK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CartorCFS24, author = {Max Cartor and Ryann Cartor and Hiroki Furue and Daniel Smith{-}Tone}, editor = {Qiang Tang and Vanessa Teague}, title = {Improved Cryptanalysis of {HFERP}}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {413--440}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_14}, doi = {10.1007/978-3-031-57718-5\_14}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CartorCFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChenLP24, author = {Mingjie Chen and Antonin Leroux and Lorenz Panny}, editor = {Qiang Tang and Vanessa Teague}, title = {{SCALLOP-HD:} Group Action from 2-Dimensional Isogenies}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {190--216}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_7}, doi = {10.1007/978-3-031-57725-3\_7}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChenLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChenZZDL24, author = {Yu Chen and Min Zhang and Cong Zhang and Minglang Dong and Weiran Liu}, editor = {Qiang Tang and Vanessa Teague}, title = {Private Set Operations from Multi-query Reverse Private Membership Test}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {387--416}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_13}, doi = {10.1007/978-3-031-57725-3\_13}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChenZZDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CuiLYYYZ24, author = {Hongrui Cui and Hanlin Liu and Di Yan and Kang Yang and Yu Yu and Kaiyi Zhang}, editor = {Qiang Tang and Vanessa Teague}, title = {sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {229--258}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_8}, doi = {10.1007/978-3-031-57718-5\_8}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CuiLYYYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DavisGHRS24, author = {Hannah Davis and Matthew D. Green and Nadia Heninger and Keegan Ryan and Adam Suhl}, editor = {Qiang Tang and Vanessa Teague}, title = {On the Possibility of a Backdoor in the Micali-Schnorr Generator}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {352--386}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_12}, doi = {10.1007/978-3-031-57718-5\_12}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DavisGHRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DuttaGJ24, author = {Moumita Dutta and Chaya Ganesh and Neha Jawalkar}, editor = {Qiang Tang and Vanessa Teague}, title = {Succinct Verification of Compressed Sigma Protocols in the Updatable {SRS} Setting}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {305--336}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_10}, doi = {10.1007/978-3-031-57722-2\_10}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DuttaGJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/EscuderoTX24, author = {Daniel Escudero and Ivan Tjuawinata and Chaoping Xing}, editor = {Qiang Tang and Vanessa Teague}, title = {On Information-Theoretic Secure Multiparty Computation with Local Repairability}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {205--239}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_7}, doi = {10.1007/978-3-031-57722-2\_7}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/EscuderoTX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalbraithLM24, author = {Steven D. Galbraith and Yi{-}Fu Lai and Hart Montgomery}, editor = {Qiang Tang and Vanessa Teague}, title = {A Simpler and More Efficient Reduction of DLog to {CDH} for Abelian Group Actions}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {36--60}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_2}, doi = {10.1007/978-3-031-57725-3\_2}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GalbraithLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GargGL24, author = {Rachit Garg and Rishab Goyal and George Lu}, editor = {Qiang Tang and Vanessa Teague}, title = {Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {69--104}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_3}, doi = {10.1007/978-3-031-57728-4\_3}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GargGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GargHMM24, author = {Sanjam Garg and Mohammad Hajiabadi and Peihan Miao and Alice Murphy}, editor = {Qiang Tang and Vanessa Teague}, title = {Laconic Branching Programs from the Diffie-Hellman Assumption}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {323--355}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_11}, doi = {10.1007/978-3-031-57725-3\_11}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GargHMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GayU24, author = {Romain Gay and Bogdan Ursu}, editor = {Qiang Tang and Vanessa Teague}, title = {On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {74--104}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_3}, doi = {10.1007/978-3-031-57718-5\_3}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GayU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GuilhemP24, author = {Cyprien Delpech de Saint Guilhem and Robi Pedersen}, editor = {Qiang Tang and Vanessa Teague}, title = {New Proof Systems and an {OPRF} from {CSIDH}}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {217--251}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_8}, doi = {10.1007/978-3-031-57725-3\_8}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GuilhemP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HanLG24, author = {Shuai Han and Shengli Liu and Dawu Gu}, editor = {Qiang Tang and Vanessa Teague}, title = {More Efficient Public-Key Cryptography with Leakage and Tamper Resilience}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {3--34}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_1}, doi = {10.1007/978-3-031-57728-4\_1}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HanLG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HofheinzHKKU24, author = {Dennis Hofheinz and Kristina Host{\'{a}}kov{\'{a}} and Julia Kastner and Karen Klein and Akin {\"{U}}nal}, editor = {Qiang Tang and Vanessa Teague}, title = {Compact Selective Opening Security from {LWE}}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {127--160}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_5}, doi = {10.1007/978-3-031-57728-4\_5}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HofheinzHKKU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HofheinzHLU24, author = {Dennis Hofheinz and Kristina Host{\'{a}}kov{\'{a}} and Roman Langrehr and Bogdan Ursu}, editor = {Qiang Tang and Vanessa Teague}, title = {On Structure-Preserving Cryptography and Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {255--287}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_9}, doi = {10.1007/978-3-031-57725-3\_9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HofheinzHLU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KatsumataLR24, author = {Shuichi Katsumata and Yi{-}Fu Lai and Michael Reichle}, editor = {Qiang Tang and Vanessa Teague}, title = {Breaking Parallel {ROS:} Implication for Isogeny and Lattice-Based Blind Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {319--351}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_11}, doi = {10.1007/978-3-031-57718-5\_11}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KatsumataLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KosugeX24, author = {Haruhisa Kosuge and Keita Xagawa}, editor = {Qiang Tang and Vanessa Teague}, title = {Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {259--288}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_9}, doi = {10.1007/978-3-031-57718-5\_9}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KosugeX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KwakMS24, author = {Hyesun Kwak and Seonhong Min and Yongsoo Song}, editor = {Qiang Tang and Vanessa Teague}, title = {Towards Practical Multi-key {TFHE:} Parallelizable, Key-Compatible, Quasi-linear Complexity}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {354--385}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_12}, doi = {10.1007/978-3-031-57728-4\_12}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KwakMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LehmannO24, author = {Anja Lehmann and Cavit {\"{O}}zbay}, editor = {Qiang Tang and Vanessa Teague}, title = {Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {196--228}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_7}, doi = {10.1007/978-3-031-57718-5\_7}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LehmannO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiL24, author = {Yiming Li and Shengli Liu}, editor = {Qiang Tang and Vanessa Teague}, title = {Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {288--320}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_10}, doi = {10.1007/978-3-031-57725-3\_10}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiYX24, author = {Luying Li and Wei Yu and Peng Xu}, editor = {Qiang Tang and Vanessa Teague}, title = {Fast and Simple Point Operations on Edwards448 and {E448}}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {389--411}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_13}, doi = {10.1007/978-3-031-57728-4\_13}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiYX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Libert24, author = {Beno{\^{\i}}t Libert}, editor = {Qiang Tang and Vanessa Teague}, title = {Vector Commitments with Proofs of Smallness: Short Range Proofs and More}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {36--67}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_2}, doi = {10.1007/978-3-031-57722-2\_2}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Libert24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Libert24a, author = {Beno{\^{\i}}t Libert}, editor = {Qiang Tang and Vanessa Teague}, title = {Simulation-Extractable {KZG} Polynomial Commitments and Applications to HyperPlonk}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {68--98}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_3}, doi = {10.1007/978-3-031-57722-2\_3}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Libert24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LinSZEYTA24, author = {Xiuhan Lin and Moeto Suzuki and Shiduo Zhang and Thomas Espitau and Yang Yu and Mehdi Tibouchi and Masayuki Abe}, editor = {Qiang Tang and Vanessa Teague}, title = {Cryptanalysis of the Peregrine Lattice-Based Signature Scheme}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {387--412}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_13}, doi = {10.1007/978-3-031-57718-5\_13}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LinSZEYTA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LingNPTWX24, author = {San Ling and Khoa Nguyen and Duong Hieu Phan and Khai Hanh Tang and Huaxiong Wang and Yanhong Xu}, editor = {Qiang Tang and Vanessa Teague}, title = {Fully Dynamic Attribute-Based Signatures for Circuits from Codes}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {37--73}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_2}, doi = {10.1007/978-3-031-57718-5\_2}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LingNPTWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LingZCHQ24, author = {Yunhao Ling and Kai Zhang and Jie Chen and Qiong Huang and Haifeng Qian}, editor = {Qiang Tang and Vanessa Teague}, title = {Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {105--126}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_4}, doi = {10.1007/978-3-031-57728-4\_4}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LingZCHQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuW24, author = {Xindong Liu and Li{-}Ping Wang}, editor = {Qiang Tang and Vanessa Teague}, title = {Short Code-Based One-out-of-Many Proofs and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {370--399}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_12}, doi = {10.1007/978-3-031-57722-2\_12}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MicciancioV24, author = {Daniele Micciancio and Vinod Vaikuntanathan}, editor = {Qiang Tang and Vanessa Teague}, title = {SoK: Learning with Errors, Circular Security, and Fully Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {291--321}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_10}, doi = {10.1007/978-3-031-57728-4\_10}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MicciancioV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MicheliKMS24, author = {Gabrielle De Micheli and Duhyeong Kim and Daniele Micciancio and Adam Suhl}, editor = {Qiang Tang and Vanessa Teague}, title = {Faster Amortized {FHEW} Bootstrapping Using Ring Automorphisms}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {322--353}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_11}, doi = {10.1007/978-3-031-57728-4\_11}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MicheliKMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MitrokotsaMSST24, author = {Aikaterini Mitrokotsa and Sayantan Mukherjee and Mahdi Sedaghat and Daniel Slamanig and Jenit Tomy}, editor = {Qiang Tang and Vanessa Teague}, title = {Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {163--195}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_6}, doi = {10.1007/978-3-031-57718-5\_6}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MitrokotsaMSST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PanZ24, author = {Jiaxin Pan and Runzhi Zeng}, editor = {Qiang Tang and Vanessa Teague}, title = {Selective Opening Security in the Quantum Random Oracle Model, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {92--122}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_4}, doi = {10.1007/978-3-031-57725-3\_4}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PanZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PengCWHH24, author = {Cong Peng and Rongmao Chen and Yi Wang and Debiao He and Xinyi Huang}, editor = {Qiang Tang and Vanessa Teague}, title = {Parameter-Hiding Order-Revealing Encryption Without Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {227--256}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_8}, doi = {10.1007/978-3-031-57728-4\_8}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PengCWHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PoetteringR24, author = {Bertram Poettering and Simon Rastikian}, editor = {Qiang Tang and Vanessa Teague}, title = {Formalizing Hash-then-Sign Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {289--315}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_10}, doi = {10.1007/978-3-031-57718-5\_10}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PoetteringR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SantosCF24, author = {Maria Corte{-}Real Santos and Craig Costello and Sam Frengley}, editor = {Qiang Tang and Vanessa Teague}, title = {An Algorithm for Efficient Detection of (N, N)-Splittings and Its Application to the Isogeny Problem in Dimension 2}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {157--189}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_6}, doi = {10.1007/978-3-031-57725-3\_6}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SantosCF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangLL24, author = {Zhedong Wang and Qiqi Lai and Feng{-}Hao Liu}, editor = {Qiang Tang and Vanessa Teague}, title = {Ring/Module Learning with Errors Under Linear Leakage - Hardness and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {275--304}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_9}, doi = {10.1007/978-3-031-57722-2\_9}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangYZJ24, author = {Hongxiao Wang and Siu{-}Ming Yiu and Yanmin Zhao and Zoe Lin Jiang}, editor = {Qiang Tang and Vanessa Teague}, title = {Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {3--35}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_1}, doi = {10.1007/978-3-031-57722-2\_1}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangYZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/XiaWWGW24, author = {Wenwen Xia and Leizhang Wang and Geng Wang and Dawu Gu and Baocang Wang}, editor = {Qiang Tang and Vanessa Teague}, title = {A Refined Hardness Estimation of {LWE} in Two-Step Mode}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {3--35}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_1}, doi = {10.1007/978-3-031-57725-3\_1}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/XiaWWGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhangSG24, author = {Yuncong Zhang and Shifeng Sun and Dawu Gu}, editor = {Qiang Tang and Vanessa Teague}, title = {Efficient KZG-Based Univariate Sum-Check and Lookup Argument}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, pages = {400--425}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2\_13}, doi = {10.1007/978-3-031-57722-2\_13}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ZhangSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhangZZGC24, author = {Yijian Zhang and Jun Zhao and Ziqi Zhu and Junqing Gong and Jie Chen}, editor = {Qiang Tang and Vanessa Teague}, title = {Registered Attribute-Based Signature}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {133--162}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_5}, doi = {10.1007/978-3-031-57718-5\_5}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ZhangZZGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhouLH24, author = {Yunxiao Zhou and Shengli Liu and Shuai Han}, editor = {Qiang Tang and Vanessa Teague}, title = {Multi-hop Fine-Grained Proxy Re-encryption}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, pages = {161--192}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4\_6}, doi = {10.1007/978-3-031-57728-4\_6}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ZhouLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2024-1, editor = {Qiang Tang and Vanessa Teague}, title = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5}, doi = {10.1007/978-3-031-57718-5}, isbn = {978-3-031-57720-8}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2024-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2024-2, editor = {Qiang Tang and Vanessa Teague}, title = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14602}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57722-2}, doi = {10.1007/978-3-031-57722-2}, isbn = {978-3-031-57721-5}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2024-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2024-3, editor = {Qiang Tang and Vanessa Teague}, title = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3}, doi = {10.1007/978-3-031-57725-3}, isbn = {978-3-031-57724-6}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2024-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2024-4, editor = {Qiang Tang and Vanessa Teague}, title = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14604}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57728-4}, doi = {10.1007/978-3-031-57728-4}, isbn = {978-3-031-57727-7}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2024-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AmbronaG23, author = {Miguel Ambrona and Romain Gay}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Multi-authority {ABE} for Non-monotonic Access Structures}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {306--335}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_11}, doi = {10.1007/978-3-031-31371-4\_11}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AmbronaG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ArunGLMS23, author = {Arasu Arun and Chaya Ganesh and Satya V. Lokam and Tushar Mopuri and Sriram Sridhar}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Dew: {A} Transparent Constant-Sized Polynomial Commitment Scheme}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {542--571}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_19}, doi = {10.1007/978-3-031-31371-4\_19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ArunGLMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AtenieseCFPT23, author = {Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Verifiable Capacity-Bound Functions: {A} New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting)}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {63--93}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_3}, doi = {10.1007/978-3-031-31371-4\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AtenieseCFPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AttemaCK23, author = {Thomas Attema and Pedro Capit{\~{a}}o and Lisa Kohl}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {On Homomorphic Secret Sharing from Polynomial-Modulus {LWE}}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {3--32}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_1}, doi = {10.1007/978-3-031-31371-4\_1}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AttemaCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AvitabileBF23, author = {Gennaro Avitabile and Vincenzo Botta and Dario Fiore}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Extendable Threshold Ring Signatures with Enhanced Anonymity}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {281--311}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_11}, doi = {10.1007/978-3-031-31368-4\_11}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AvitabileBF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BadrinarayananMMPRS23, author = {Saikrishna Badrinarayanan and Daniel Masny and Pratyay Mukherjee and Sikhar Patranabis and Srinivasan Raghuraman and Pratik Sarkar}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Round-Optimal Oblivious Transfer and {MPC} from Computational {CSIDH}}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {376--405}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_14}, doi = {10.1007/978-3-031-31368-4\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BadrinarayananMMPRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaumDDKNO23, author = {Carsten Baum and Bernardo David and Rafael Dowsley and Ravi Kishore and Jesper Buus Nielsen and Sabine Oechsner}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {{CRAFT:} Composable Randomness Beacons and Output-Independent Abort {MPC} From Time}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {439--470}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_16}, doi = {10.1007/978-3-031-31368-4\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BaumDDKNO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellareDD23, author = {Mihir Bellare and Hannah Davis and Zijing Di}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {223--250}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_9}, doi = {10.1007/978-3-031-31368-4\_9}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellareDD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BenzBEMOS23, author = {Laurin Benz and Wasilij Beskorovajnov and Sarai Eilebrecht and J{\"{o}}rn M{\"{u}}ller{-}Quade and Astrid Ottenhues and Rebecca Schwerdt}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Sender-binding Key Encapsulation}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {744--773}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_26}, doi = {10.1007/978-3-031-31368-4\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BenzBEMOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BhadauriaHVWZ23, author = {Rishabh Bhadauria and Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Wenxuan Wu and Yupeng Zhang}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Private Polynomial Commitments and Applications to {MPC}}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {127--158}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_5}, doi = {10.1007/978-3-031-31371-4\_5}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BhadauriaHVWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BouscatieCS23, author = {Elie Bouscati{\'{e}} and Guilhem Castagnos and Olivier Sanders}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Pattern Matching in Encrypted Stream from Inner Product Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {774--801}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_27}, doi = {10.1007/978-3-031-31368-4\_27}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BouscatieCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrunettaHS23, author = {Carlo Brunetta and Hans Heum and Martijn Stam}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Multi-instance Secure Public-Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {336--367}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_12}, doi = {10.1007/978-3-031-31371-4\_12}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrunettaHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BuiC23, author = {Dung Bui and Geoffroy Couteau}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Improved Private Set Intersection for Sets with Small Entries}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {190--220}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_7}, doi = {10.1007/978-3-031-31371-4\_7}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BuiC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CampanelliFO23, author = {Matteo Campanelli and Danilo Francati and Claudio Orlandi}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Structure-Preserving Compilers from New Notions of Obfuscations}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {663--693}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_23}, doi = {10.1007/978-3-031-31371-4\_23}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CampanelliFO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoFG23, author = {Dario Catalano and Dario Fiore and Emanuele Giunta}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Efficient and Universally Composable Single Secret Leader Election from Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {471--499}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_17}, doi = {10.1007/978-3-031-31368-4\_17}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChakrabortyPW23, author = {Suvradip Chakraborty and Manoj Prabhakaran and Daniel Wichs}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {A Map of Witness Maps: New Definitions and Connections}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {635--662}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_22}, doi = {10.1007/978-3-031-31371-4\_22}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChakrabortyPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChvojkaJ23, author = {Peter Chvojka and Tibor Jager}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {500--529}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_18}, doi = {10.1007/978-3-031-31368-4\_18}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChvojkaJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CouteauD23, author = {Geoffroy Couteau and Cl{\'{e}}ment Ducros}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Pseudorandom Correlation Functions from Variable-Density LPN, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {221--250}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_8}, doi = {10.1007/978-3-031-31371-4\_8}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CouteauD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DattaP23, author = {Pratish Datta and Tapas Pal}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Decentralized Multi-Authority Attribute-Based Inner-Product {FE:} Large Universe and Unbounded}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {587--621}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_21}, doi = {10.1007/978-3-031-31368-4\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DattaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DottlingGM23, author = {Nico D{\"{o}}ttling and Phillip Gajland and Giulio Malavolta}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Laconic Function Evaluation for Turing Machines}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {606--634}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_21}, doi = {10.1007/978-3-031-31371-4\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DottlingGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DucasG23, author = {L{\'{e}}o Ducas and Shane Gibbons}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Hull Attacks on the Lattice Isomorphism Problem}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {177--204}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_7}, doi = {10.1007/978-3-031-31368-4\_7}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DucasG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DumanHKKLR23, author = {Julien Duman and Dominik Hartmann and Eike Kiltz and Sabrina Kunzweiler and Jonas Lehmann and Doreen Riepel}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Generic Models for Group Actions}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {406--435}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_15}, doi = {10.1007/978-3-031-31368-4\_15}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DumanHKKLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DumanHKLSU23, author = {Julien Duman and Kathrin H{\"{o}}velmanns and Eike Kiltz and Vadim Lyubashevsky and Gregor Seiler and Dominique Unruh}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {A Thorough Treatment of Highly-Efficient {NTRU} Instantiations}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {65--94}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_3}, doi = {10.1007/978-3-031-31368-4\_3}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DumanHKLSU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DuzluKPS23, author = {Samed D{\"{u}}zl{\"{u}} and Juliane Kr{\"{a}}mer and Thomas P{\"{o}}ppelmann and Patrick Struck}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {A Lightweight Identification Protocol Based on Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {95--113}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_4}, doi = {10.1007/978-3-031-31368-4\_4}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DuzluKPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaonioHR23, author = {Antonio Faonio and Dennis Hofheinz and Luigi Russo}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {275--305}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_10}, doi = {10.1007/978-3-031-31371-4\_10}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaonioHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FeoFKLMPW23, author = {Luca De Feo and Tako Boris Fouotsa and P{\'{e}}ter Kutas and Antonin Leroux and Simon{-}Philipp Merz and Lorenz Panny and Benjamin Wesolowski}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {{SCALLOP:} Scaling the CSI-FiSh}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {345--375}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_13}, doi = {10.1007/978-3-031-31368-4\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FeoFKLMPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FouqueGQRW23, author = {Pierre{-}Alain Fouque and Adela Georgescu and Chen Qian and Adeline Roux{-}Langlois and Weiqiang Wen}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {A Generic Transform from Multi-round Interactive Proof to {NIZK}}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {461--481}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_16}, doi = {10.1007/978-3-031-31371-4\_16}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FouqueGQRW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GaltelandP23, author = {Yao Jiang Galteland and Jiaxin Pan}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {399--428}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_14}, doi = {10.1007/978-3-031-31371-4\_14}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GaltelandP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GargHJJPS23, author = {Sanjam Garg and Mohammad Hajiabadi and Abhishek Jain and Zhengzhong Jin and Omkant Pandey and Sina Shiehian}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Credibility in Private Set Membership}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {159--189}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_6}, doi = {10.1007/978-3-031-31371-4\_6}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GargHJJPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GhosalSW23, author = {Riddhi Ghosal and Amit Sahai and Brent Waters}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Non-Interactive Publicly-Verifiable Delegation of Committed Programs}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {575--605}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_20}, doi = {10.1007/978-3-031-31371-4\_20}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GhosalSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GhoshS23, author = {Satrajit Ghosh and Mark Simkin}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Threshold Private Set Intersection with Better Communication Complexity}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {251--272}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_9}, doi = {10.1007/978-3-031-31371-4\_9}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GhoshS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HebantPS23, author = {Chlo{\'{e}} H{\'{e}}bant and David Pointcheval and Robert Sch{\"{a}}dlich}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {312--341}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_12}, doi = {10.1007/978-3-031-31368-4\_12}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HebantPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HeningerR23, author = {Nadia Heninger and Keegan Ryan}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing {MEGA} in Six Queries and Other Applications}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {147--176}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_6}, doi = {10.1007/978-3-031-31368-4\_6}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HeningerR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HoffmannHKP23, author = {Charlotte Hoffmann and Pavel Hub{\'{a}}cek and Chethan Kamath and Krzysztof Pietrzak}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Certifying Giant Nonprimes}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {530--553}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_19}, doi = {10.1007/978-3-031-31368-4\_19}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HoffmannHKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HoffmannLMPS23, author = {Cl{\'{e}}ment Hoffmann and Beno{\^{\i}}t Libert and Charles Momin and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {{POLKA:} Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {114--144}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_5}, doi = {10.1007/978-3-031-31368-4\_5}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HoffmannLMPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KolonelosMV23, author = {Dimitris Kolonelos and Mary Maller and Mikhail Volkhov}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Zero-Knowledge Arguments for Subverted {RSA} Groups}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {512--541}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_18}, doi = {10.1007/978-3-031-31371-4\_18}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KolonelosMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KrauszLRG23, author = {Markus Krausz and Georg Land and Jan Richter{-}Brockmann and Tim G{\"{u}}neysu}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {94--124}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_4}, doi = {10.1007/978-3-031-31371-4\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KrauszLRG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LeeY23, author = {KangHoon Lee and Ji Won Yoon}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {33--62}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_2}, doi = {10.1007/978-3-031-31371-4\_2}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LeeY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuLHG23, author = {Xiangyu Liu and Shengli Liu and Shuai Han and Dawu Gu}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {{EKE} Meets Tight Security in the Universally Composable Framework}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {685--713}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_24}, doi = {10.1007/978-3-031-31368-4\_24}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuLHG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuLHG23a, author = {Xiangyu Liu and Shengli Liu and Shuai Han and Dawu Gu}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Fine-Grained Verifier {NIZK} and Its Applications}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {482--511}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_17}, doi = {10.1007/978-3-031-31371-4\_17}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuLHG23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Lysyanskaya23, author = {Anna Lysyanskaya}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Security Analysis of {RSA-BSSA}}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {251--280}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_10}, doi = {10.1007/978-3-031-31368-4\_10}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Lysyanskaya23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MaramX23, author = {Varun Maram and Keita Xagawa}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Post-quantum Anonymity of Kyber}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {3--35}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_1}, doi = {10.1007/978-3-031-31368-4\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MaramX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MiaoPW23, author = {Peihan Miao and Sikhar Patranabis and Gaven J. Watson}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Unidirectional Updatable Encryption and Proxy Re-encryption from {DDH}}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {368--398}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_13}, doi = {10.1007/978-3-031-31371-4\_13}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MiaoPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Prest23, author = {Thomas Prest}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {A Key-Recovery Attack Against Mitaka in the t-Probing Model}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {205--220}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_8}, doi = {10.1007/978-3-031-31368-4\_8}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Prest23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/RoyX23, author = {Lawrence Roy and Jiayu Xu}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {A Universally Composable {PAKE} with Zero Communication Cost - (And Why It Shouldn't Be Considered UC-Secure)}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {714--743}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_25}, doi = {10.1007/978-3-031-31368-4\_25}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/RoyX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShanGX23, author = {Tianshu Shan and Jiangxia Ge and Rui Xue}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {QCCA-Secure Generic Transformations in the Quantum Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {36--64}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_2}, doi = {10.1007/978-3-031-31368-4\_2}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShanGX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShiV23, author = {Elaine Shi and Nikhil Vanjani}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {622--651}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_22}, doi = {10.1007/978-3-031-31368-4\_22}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShiV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SrinivasanLMNPT23, author = {Shravan Srinivasan and Julian Loss and Giulio Malavolta and Kartik Nayak and Charalampos Papamanthou and Sri Aravinda Krishnan Thyagarajan}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {554--584}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_20}, doi = {10.1007/978-3-031-31368-4\_20}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SrinivasanLMNPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/VenemaA23, author = {Marloes Venema and Greg Alp{\'{a}}r}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {{GLUE:} Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {652--682}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_23}, doi = {10.1007/978-3-031-31368-4\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/VenemaA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangSWG23, author = {Geng Wang and Shi{-}Feng Sun and Zhedong Wang and Dawu Gu}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {429--458}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_15}, doi = {10.1007/978-3-031-31371-4\_15}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangSWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2023-1, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4}, doi = {10.1007/978-3-031-31368-4}, isbn = {978-3-031-31367-7}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2023-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2023-2, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4}, doi = {10.1007/978-3-031-31371-4}, isbn = {978-3-031-31370-7}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0001TW22, author = {Ngoc Khanh Nguyen and Eftychios Theodorakis and Bogdan Warinschi}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Lifting Standard Model Reductions to Common Setup Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {130--160}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_5}, doi = {10.1007/978-3-030-97131-1\_5}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/0001TW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0005DM22, author = {Pedro Branco and Nico D{\"{o}}ttling and Paulo Mateus}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Two-Round Oblivious Linear Evaluation from Learning with Errors}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {379--408}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_14}, doi = {10.1007/978-3-030-97121-2\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/0005DM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbramS22, author = {Damiano Abram and Peter Scholl}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Low-Communication Multiparty Triple Generation for {SPDZ} from Ring-LPN}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {221--251}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_9}, doi = {10.1007/978-3-030-97121-2\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbramS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AranhaBCGO022, author = {Diego F. Aranha and Emil Madsen Bennedsen and Matteo Campanelli and Chaya Ganesh and Claudio Orlandi and Akira Takahashi}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {{ECLIPSE:} Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {584--614}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_21}, doi = {10.1007/978-3-030-97121-2\_21}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AranhaBCGO022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AranhaHNPY22, author = {Diego F. Aranha and Mathias Hall{-}Andersen and Anca Nitulescu and Elena Pagnin and Sophia Yakoubov}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Count Me In! Extendability for Threshold Ring Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {379--406}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_13}, doi = {10.1007/978-3-030-97131-1\_13}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AranhaHNPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AronestyCDGHKT22, author = {Erik Aronesty and David Cash and Yevgeniy Dodis and Daniel H. Gallancy and Christopher Higley and Harish Karthikeyan and Oren Tysor}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {256--285}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_9}, doi = {10.1007/978-3-030-97131-1\_9}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AronestyCDGHKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BartusekGSZ22, author = {James Bartusek and Sanjam Garg and Akshayaram Srinivasan and Yinuo Zhang}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Reusable Two-Round {MPC} from {LPN}}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {165--193}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_7}, doi = {10.1007/978-3-030-97121-2\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BartusekGSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BeskorovajnovGM22, author = {Wasilij Beskorovajnov and Roland Gr{\"{o}}ll and J{\"{o}}rn M{\"{u}}ller{-}Quade and Astrid Ottenhues and Rebecca Schwerdt}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {A New Security Notion for {PKC} in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {316--344}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_11}, doi = {10.1007/978-3-030-97131-1\_11}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BeskorovajnovGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrendelF0JS22, author = {Jacqueline Brendel and Rune Fiedler and Felix G{\"{u}}nther and Christian Janson and Douglas Stebila}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {3--34}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_1}, doi = {10.1007/978-3-030-97131-1\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrendelF0JS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BunnKO22, author = {Paul Bunn and Eyal Kushilevitz and Rafail Ostrovsky}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {{CNF-FSS} and Its Applications}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {283--314}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_11}, doi = {10.1007/978-3-030-97121-2\_11}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BunnKO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChatterjeeCLM22, author = {Rohit Chatterjee and Kai{-}Min Chung and Xiao Liang and Giulio Malavolta}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {A Note on the Post-quantum Security of (Ring) Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {407--436}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_14}, doi = {10.1007/978-3-030-97131-1\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ChatterjeeCLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Connolly0P22, author = {Aisling Connolly and Pascal Lafourcade and Octavio Perez{-}Kempner}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {409--438}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_15}, doi = {10.1007/978-3-030-97121-2\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Connolly0P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DAnversB22, author = {Jan{-}Pieter D'Anvers and Senne Batsleer}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {3--33}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_1}, doi = {10.1007/978-3-030-97121-2\_1}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DAnversB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DartoisF22, author = {Pierrick Dartois and Luca De Feo}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {On the Security of {OSIDH}}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {52--81}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_3}, doi = {10.1007/978-3-030-97121-2\_3}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DartoisF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DeveveyLP22, author = {Julien Devevey and Beno{\^{\i}}t Libert and Thomas Peters}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Rational Modular Encoding in the {DCR} Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {615--646}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_22}, doi = {10.1007/978-3-030-97121-2\_22}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DeveveyLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Ebrahimi22, author = {Ehsan Ebrahimi}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Post-quantum Security of Plain {OAEP} Transform}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {34--51}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_2}, doi = {10.1007/978-3-030-97121-2\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Ebrahimi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/EsginSZ22, author = {Muhammed F. Esgin and Ron Steinfeld and Raymond K. Zhao}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {317--348}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_12}, doi = {10.1007/978-3-030-97121-2\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/EsginSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Esser022, author = {Andre Esser and Emanuele Bellini}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Syndrome Decoding Estimator}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {112--141}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_5}, doi = {10.1007/978-3-030-97121-2\_5}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Esser022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustHKS22, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Financially Backed Covert Security}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {99--129}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_4}, doi = {10.1007/978-3-030-97131-1\_4}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FaustHKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FouotsaKMT22, author = {Tako Boris Fouotsa and P{\'{e}}ter Kutas and Simon{-}Philipp Merz and Yan Bo Ti}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {On the Isogeny Problem with Torsion Point Information}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {142--161}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_6}, doi = {10.1007/978-3-030-97121-2\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FouotsaKMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GoyalKMPS22, author = {Vipul Goyal and Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno and Yifan Song}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Storing and Retrieving Secrets on a Blockchain}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {252--282}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_10}, doi = {10.1007/978-3-030-97121-2\_10}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GoyalKMPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HaqueKSS22, author = {Abida Haque and Stephan Krenn and Daniel Slamanig and Christoph Striecks}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {437--467}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_15}, doi = {10.1007/978-3-030-97131-1\_15}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HaqueKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IshibashiY22, author = {Ren Ishibashi and Kazuki Yoneyama}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {35--65}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_2}, doi = {10.1007/978-3-030-97131-1\_2}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/IshibashiY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KarpmanL22, author = {Pierre Karpman and Charlotte Lefevre}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Time-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary Codes}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {82--111}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_4}, doi = {10.1007/978-3-030-97121-2\_4}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/KarpmanL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KastnerLX22, author = {Julia Kastner and Julian Loss and Jiayu Xu}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {On Pairing-Free Blind Signature Schemes in the Algebraic Group Model}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {468--497}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_16}, doi = {10.1007/978-3-030-97131-1\_16}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/KastnerLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KitagawaN22, author = {Fuyuki Kitagawa and Ryo Nishimaki}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {{KDM} Security for the Fujisaki-Okamoto Transformations in the {QROM}}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {286--315}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_10}, doi = {10.1007/978-3-030-97131-1\_10}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/KitagawaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kluczniak22, author = {Kamil Kluczniak}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {69--98}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_3}, doi = {10.1007/978-3-030-97131-1\_3}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Kluczniak22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiLW22, author = {Qiqi Lai and Feng{-}Hao Liu and Zhedong Wang}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Leakage-Resilient {IBE/} {ABE} with Optimal Leakage Rates from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {225--255}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_8}, doi = {10.1007/978-3-030-97131-1\_8}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LaiLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Lipmaa22, author = {Helger Lipmaa}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {A Unified Framework for Non-universal SNARKs}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {553--583}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_20}, doi = {10.1007/978-3-030-97121-2\_20}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Lipmaa22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuWY22, author = {Yi Liu and Qi Wang and Siu{-}Ming Yiu}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Making Private Function Evaluation Safer, Faster, and Simpler}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {349--378}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_13}, doi = {10.1007/978-3-030-97121-2\_13}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Lyubashevsky0P22, author = {Vadim Lyubashevsky and Ngoc Khanh Nguyen and Maxime Plan{\c{c}}on}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {498--527}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_17}, doi = {10.1007/978-3-030-97131-1\_17}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Lyubashevsky0P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MaitraW22, author = {Sarasij Maitra and David J. Wu}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Traceable PRFs: Full Collusion Resistance and Active Security}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {439--469}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_16}, doi = {10.1007/978-3-030-97121-2\_16}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MaitraW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MeraKMS22, author = {Jose Maria Bermudo Mera and Angshuman Karmakar and Tilen Marc and Azam Soleimanian}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Efficient Lattice-Based Inner-Product Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {163--193}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_6}, doi = {10.1007/978-3-030-97131-1\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MeraKMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Nishimaki22, author = {Ryo Nishimaki}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {The Direction of Updatable Encryption Does Matter}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {194--224}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_7}, doi = {10.1007/978-3-030-97131-1\_7}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Nishimaki22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OnukiM22, author = {Hiroshi Onuki and Tomoki Moriya}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Radical Isogenies on Montgomery Curves}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {473--497}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_17}, doi = {10.1007/978-3-030-97121-2\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OnukiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OrlandiRS22, author = {Claudio Orlandi and Divya Ravi and Peter Scholl}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {On the Bottleneck Complexity of {MPC} with Correlated Randomness}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {194--220}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_8}, doi = {10.1007/978-3-030-97121-2\_8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/OrlandiRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PanW22, author = {Jiaxin Pan and Benedikt Wagner}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Lattice-Based Signatures with Tight Adaptive Corruptions and More}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {347--378}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_12}, doi = {10.1007/978-3-030-97131-1\_12}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PanW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SzepieniecZ22, author = {Alan Szepieniec and Yuncong Zhang}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Polynomial IOPs for Linear Algebra Relations}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {523--552}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_19}, doi = {10.1007/978-3-030-97121-2\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SzepieniecZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhangY22, author = {Shiduo Zhang and Yang Yu}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Towards a Simpler Lattice Gadget Toolkit}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {498--520}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_18}, doi = {10.1007/978-3-030-97121-2\_18}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ZhangY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2022-1, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2}, doi = {10.1007/978-3-030-97121-2}, isbn = {978-3-030-97120-5}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2022-2, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1}, doi = {10.1007/978-3-030-97131-1}, isbn = {978-3-030-97130-4}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0005DP21, author = {Pedro Branco and Nico D{\"{o}}ttling and Sihang Pu}, editor = {Juan A. Garay}, title = {Multiparty Cardinality Testing for Threshold Private Intersection}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {32--60}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_2}, doi = {10.1007/978-3-030-75248-4\_2}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/0005DP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalBMMP21, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis}, editor = {Juan A. Garay}, title = {{BETA:} Biometric-Enabled Threshold Authentication}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {290--318}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_11}, doi = {10.1007/978-3-030-75248-4\_11}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalBMMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AlbrechtDDS21, author = {Martin R. Albrecht and Alex Davidson and Amit Deo and Nigel P. Smart}, editor = {Juan A. Garay}, title = {Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {261--289}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_10}, doi = {10.1007/978-3-030-75248-4\_10}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AlbrechtDDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Ambrona21, author = {Miguel Ambrona}, editor = {Juan A. Garay}, title = {Generic Negation of Pair Encodings}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {120--146}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_5}, doi = {10.1007/978-3-030-75248-4\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Ambrona21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BadertscherMPR21, author = {Christian Badertscher and Ueli Maurer and Christopher Portmann and Guilherme Rito}, editor = {Juan A. Garay}, title = {Revisiting {(R)CCA} Security and Replay Protection}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {173--202}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_7}, doi = {10.1007/978-3-030-75248-4\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BadertscherMPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BadrinarayananM21, author = {Saikrishna Badrinarayanan and Peihan Miao and Srinivasan Raghuraman and Peter Rindal}, editor = {Juan A. Garay}, title = {Multi-party Threshold Private Set Intersection with Sublinear Communication}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {349--379}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_13}, doi = {10.1007/978-3-030-75248-4\_13}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BadrinarayananM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BauerFQ21, author = {Balthazar Bauer and Georg Fuchsbauer and Chen Qian}, editor = {Juan A. Garay}, title = {Transferable E-Cash: {A} Cleaner Model and the First Practical Instantiation}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {559--590}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_20}, doi = {10.1007/978-3-030-75248-4\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BauerFQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaumGKOSZ21, author = {Carsten Baum and Cyprien Delpech de Saint Guilhem and Daniel Kales and Emmanuela Orsini and Peter Scholl and Greg Zaverucha}, editor = {Juan A. Garay}, title = {Banquet: Short and Fast Signatures from {AES}}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {266--297}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_11}, doi = {10.1007/978-3-030-75245-3\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BaumGKOSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BemmannCJ21, author = {Pascal Bemmann and Rongmao Chen and Tibor Jager}, editor = {Juan A. Garay}, title = {Subversion-Resilient Public Key Encryption with Practical Watchdogs}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {627--658}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_23}, doi = {10.1007/978-3-030-75245-3\_23}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BemmannCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BhatotiaKMT21, author = {Pramod Bhatotia and Markulf Kohlweiss and Lorenzo Martinico and Yiannis Tselekounis}, editor = {Juan A. Garay}, title = {Steel: Composable Hardware-Based Stateful and Randomised Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {709--736}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_25}, doi = {10.1007/978-3-030-75248-4\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BhatotiaKMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoisCFK21, author = {Alexandre Bois and Ignacio Cascudo and Dario Fiore and Dongwoo Kim}, editor = {Juan A. Garay}, title = {Flexible and Efficient Verifiable Computation on Encrypted Data}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {528--558}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_19}, doi = {10.1007/978-3-030-75248-4\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BoisCFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BouvierI21, author = {Cyril Bouvier and Laurent Imbert}, editor = {Juan A. Garay}, title = {An Alternative Approach for {SIDH} Arithmetic}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {27--44}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_2}, doi = {10.1007/978-3-030-75245-3\_2}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BouvierI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CaforioDV21, author = {Andrea Caforio and F. Bet{\"{u}}l Durak and Serge Vaudenay}, editor = {Juan A. Garay}, title = {Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {649--677}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_23}, doi = {10.1007/978-3-030-75248-4\_23}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CaforioDV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CheonCK021, author = {Jung Hee Cheon and Wonhee Cho and Jeong Han Kim and Jiseung Kim}, editor = {Juan A. Garay}, title = {Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Functions}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {739--760}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_26}, doi = {10.1007/978-3-030-75248-4\_26}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CheonCK021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CiampiSW21, author = {Michele Ciampi and Luisa Siniscalchi and Hendrik Waldner}, editor = {Juan A. Garay}, title = {Multi-Client Functional Encryption for Separable Functions}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {724--753}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_26}, doi = {10.1007/978-3-030-75245-3\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CiampiSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CiniRSST21, author = {Valerio Cini and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks and Erkan Tairi}, editor = {Juan A. Garay}, title = {Updatable Signatures and Message Authentication Codes}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {691--723}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_25}, doi = {10.1007/978-3-030-75245-3\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CiniRSST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardO0T21, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Akira Takahashi and Mehdi Tibouchi}, editor = {Juan A. Garay}, title = {Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {99--130}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_5}, doi = {10.1007/978-3-030-75245-3\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardO0T21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DeveveyLNPY21, author = {Julien Devevey and Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Juan A. Garay}, title = {Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {659--690}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_24}, doi = {10.1007/978-3-030-75245-3\_24}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DeveveyLNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DeveveySSS21, author = {Julien Devevey and Amin Sakzad and Damien Stehl{\'{e}} and Ron Steinfeld}, editor = {Juan A. Garay}, title = {On the Integer Polynomial Learning with Errors Problem}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {184--214}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_8}, doi = {10.1007/978-3-030-75245-3\_8}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DeveveySSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DiazL21, author = {Jesus Diaz and Anja Lehmann}, editor = {Juan A. Garay}, title = {Group Signatures with User-Controlled and Sequential Linkability}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {360--388}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_14}, doi = {10.1007/978-3-030-75245-3\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DiazL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DiemertGJL21, author = {Denis Diemert and Kai Gellert and Tibor Jager and Lin Lyu}, editor = {Juan A. Garay}, title = {More Efficient Digital Signatures with Tight Multi-user Security}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {1--31}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_1}, doi = {10.1007/978-3-030-75248-4\_1}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DiemertGJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DottlingN21, author = {Nico D{\"{o}}ttling and Ryo Nishimaki}, editor = {Juan A. Garay}, title = {Universal Proxy Re-Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {512--542}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_19}, doi = {10.1007/978-3-030-75245-3\_19}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DottlingN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ErwigFHM021, author = {Andreas Erwig and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Monosij Maitra and Siavash Riahi}, editor = {Juan A. Garay}, title = {Two-Party Adaptor Signatures from Identification Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {451--480}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_17}, doi = {10.1007/978-3-030-75245-3\_17}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ErwigFHM021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FengGC21, author = {Shengyuan Feng and Junqing Gong and Jie Chen}, editor = {Juan A. Garay}, title = {Master-Key KDM-Secure {ABE} via Predicate Encoding}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {543--572}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_20}, doi = {10.1007/978-3-030-75245-3\_20}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FengGC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FischlinR21, author = {Marc Fischlin and Felix Rohrbach}, editor = {Juan A. Garay}, title = {Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {205--234}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_8}, doi = {10.1007/978-3-030-75248-4\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FischlinR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Fleischhacker021, author = {Nils Fleischhacker and Mark Simkin}, editor = {Juan A. Garay}, title = {On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {618--648}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_22}, doi = {10.1007/978-3-030-75248-4\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Fleischhacker021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GarimellaMRSS21, author = {Gayathri Garimella and Payman Mohassel and Mike Rosulek and Saeed Sadeghian and Jaspal Singh}, editor = {Juan A. Garay}, title = {Private Set Operations from Oblivious Switching}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {591--617}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_21}, doi = {10.1007/978-3-030-75248-4\_21}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GarimellaMRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HamlinV21, author = {Ariel Hamlin and Mayank Varia}, editor = {Juan A. Garay}, title = {Two-Server Distributed {ORAM} with Sublinear Computation and Constant Rounds}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {499--527}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_18}, doi = {10.1007/978-3-030-75248-4\_18}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HamlinV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HashimotoKKP21, author = {Keitaro Hashimoto and Shuichi Katsumata and Kris Kwiatkowski and Thomas Prest}, editor = {Juan A. Garay}, title = {An Efficient and Generic Construction for Signal's Handshake {(X3DH):} Post-Quantum, State Leakage Secure, and Deniable}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {410--440}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_15}, doi = {10.1007/978-3-030-75248-4\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HashimotoKKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HeathKP21, author = {David Heath and Vladimir Kolesnikov and Stanislav Peceny}, editor = {Juan A. Garay}, title = {Masked Triples - Amortizing Multiplication Triples Across Conditionals}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {319--348}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_12}, doi = {10.1007/978-3-030-75248-4\_12}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HeathKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IshaiLM21, author = {Yuval Ishai and Russell W. F. Lai and Giulio Malavolta}, editor = {Juan A. Garay}, title = {A Geometric Approach to Homomorphic Secret Sharing}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {92--119}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_4}, doi = {10.1007/978-3-030-75248-4\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/IshaiLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JagerKN21, author = {Tibor Jager and Rafael Kurek and David Niehues}, editor = {Juan A. Garay}, title = {Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {596--626}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_22}, doi = {10.1007/978-3-030-75245-3\_22}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JagerKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JareckiKX21, author = {Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu}, editor = {Juan A. Garay}, title = {On the (In)Security of the Diffie-Hellman Oblivious {PRF} with Multiplicative Blinding}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {380--409}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_14}, doi = {10.1007/978-3-030-75248-4\_14}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JareckiKX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KhuranaW21, author = {Dakshita Khurana and Brent Waters}, editor = {Juan A. Garay}, title = {On the {CCA} Compatibility of Public-Key Infrastructure}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {235--260}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_9}, doi = {10.1007/978-3-030-75248-4\_9}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KhuranaW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiLW21, author = {Qiqi Lai and Feng{-}Hao Liu and Zhedong Wang}, editor = {Juan A. Garay}, title = {Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {421--450}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_16}, doi = {10.1007/978-3-030-75245-3\_16}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaiLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuW21, author = {Xu Liu and Mingqiang Wang}, editor = {Juan A. Garay}, title = {QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {3--26}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_1}, doi = {10.1007/978-3-030-75245-3\_1}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Lyubashevsky0S21, author = {Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler}, editor = {Juan A. Garay}, title = {Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {215--241}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_9}, doi = {10.1007/978-3-030-75245-3\_9}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Lyubashevsky0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NguyenSSWXZ21, author = {Khoa Nguyen and Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng}, editor = {Juan A. Garay}, title = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {678--708}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_24}, doi = {10.1007/978-3-030-75248-4\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NguyenSSWXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Niehues21, author = {David Niehues}, editor = {Juan A. Garay}, title = {Verifiable Random Functions with Optimal Tightness}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {61--91}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_3}, doi = {10.1007/978-3-030-75248-4\_3}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Niehues21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Nuida21, author = {Koji Nuida}, editor = {Juan A. Garay}, title = {Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {441--468}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_16}, doi = {10.1007/978-3-030-75248-4\_16}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Nuida21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ONeillZ21, author = {Adam O'Neill and Mohammad Zaheri}, editor = {Juan A. Garay}, title = {On Selective-Opening Security of Deterministic Primitives}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {147--172}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_6}, doi = {10.1007/978-3-030-75248-4\_6}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ONeillZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OygardenFR21, author = {Morten {\O}ygarden and Patrick Felke and H{\aa}vard Raddum}, editor = {Juan A. Garay}, title = {Analysis of Multivariate Encryption Schemes: Application to Dob}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {155--183}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_7}, doi = {10.1007/978-3-030-75245-3\_7}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OygardenFR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Pereira21, author = {Hilder Vitor Lima Pereira}, editor = {Juan A. Garay}, title = {Bootstrapping Fully Homomorphic Encryption over the Integers in Less than One Second}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {331--359}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_13}, doi = {10.1007/978-3-030-75245-3\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Pereira21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PereiraB21, author = {Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto}, editor = {Juan A. Garay}, title = {Isogeny-Based Key Compression Without Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {131--154}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_6}, doi = {10.1007/978-3-030-75245-3\_6}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PereiraB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PlanconP21, author = {Maxime Plan{\c{c}}on and Thomas Prest}, editor = {Juan A. Garay}, title = {Exact Lattice Sampling from Non-Gaussian Distributions}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {573--595}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_21}, doi = {10.1007/978-3-030-75245-3\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PlanconP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PostlethwaiteV21, author = {Eamonn W. Postlethwaite and Fernando Virdia}, editor = {Juan A. Garay}, title = {On the Success Probability of Solving Unique {SVP} via {BKZ}}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {68--98}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_4}, doi = {10.1007/978-3-030-75245-3\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PostlethwaiteV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/RavivLT21, author = {Netanel Raviv and Ben Langton and Itzhak Tamo}, editor = {Juan A. Garay}, title = {Multivariate Public Key Cryptosystem from Sidon Spaces}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {242--265}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_10}, doi = {10.1007/978-3-030-75245-3\_10}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/RavivLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Sanders21, author = {Olivier Sanders}, editor = {Juan A. Garay}, title = {Improving Revocation for Group Signature with Redactable Signature}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {301--330}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_12}, doi = {10.1007/978-3-030-75245-3\_12}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Sanders21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ScafuroSV21, author = {Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti}, editor = {Juan A. Garay}, title = {Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {469--498}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_17}, doi = {10.1007/978-3-030-75248-4\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ScafuroSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Walter21, author = {Michael Walter}, editor = {Juan A. Garay}, title = {The Convergence of Slide-Type Reductions}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {45--67}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_3}, doi = {10.1007/978-3-030-75245-3\_3}, timestamp = {Tue, 07 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Walter21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Wang0HT21, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Juan A. Garay}, title = {Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {389--420}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_15}, doi = {10.1007/978-3-030-75245-3\_15}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Wang0HT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YuenCX21, author = {Tsz Hon Yuen and Handong Cui and Xiang Xie}, editor = {Juan A. Garay}, title = {Compact Zero-Knowledge Proofs for Threshold {ECDSA} with Trustless Setup}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {481--511}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_18}, doi = {10.1007/978-3-030-75245-3\_18}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YuenCX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2021-1, editor = {Juan A. Garay}, title = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3}, doi = {10.1007/978-3-030-75245-3}, isbn = {978-3-030-75244-6}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2021-2, editor = {Juan A. Garay}, title = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4}, doi = {10.1007/978-3-030-75248-4}, isbn = {978-3-030-75247-7}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdolmalekiLS020, author = {Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michal Zajac}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {On {QA-NIZK} in the {BPK} Model}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {590--620}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_20}, doi = {10.1007/978-3-030-45374-9\_20}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdolmalekiLS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbeAO20, author = {Masayuki Abe and Miguel Ambrona and Miyako Ohkubo}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {558--589}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_19}, doi = {10.1007/978-3-030-45374-9\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbeAO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalLMT20, author = {Shweta Agrawal and Beno{\^{\i}}t Libert and Monosij Maitra and Radu Titiu}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Adaptive Simulation Security for Inner Product Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {34--64}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_2}, doi = {10.1007/978-3-030-45374-9\_2}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrikolaCH20, author = {Thomas Agrikola and Geoffroy Couteau and Dennis Hofheinz}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {187--219}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_7}, doi = {10.1007/978-3-030-45374-9\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrikolaCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Bai0HRSSSZ20, author = {Shi Bai and Dipayan Das and Ryo Hiromasa and Miruna Rosca and Amin Sakzad and Damien Stehl{\'{e}} and Ron Steinfeld and Zhenfei Zhang}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {MPSign: {A} Signature from Small-Secret Middle-Product Learning with Errors}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {66--93}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_3}, doi = {10.1007/978-3-030-45388-6\_3}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Bai0HRSSSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaumN20, author = {Carsten Baum and Ariel Nof}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {495--526}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_17}, doi = {10.1007/978-3-030-45374-9\_17}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BaumN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Bhattacharyya20, author = {Rishiraj Bhattacharyya}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Memory-Tight Reductions for Practical Key Encapsulation Mechanisms}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {249--278}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_9}, doi = {10.1007/978-3-030-45374-9\_9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Bhattacharyya20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BouvierI20, author = {Cyril Bouvier and Laurent Imbert}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Faster Cofactorization with {ECM} Using Mixed Representations}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {483--504}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_17}, doi = {10.1007/978-3-030-45388-6\_17}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BouvierI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrakerskiK20, author = {Zvika Brakerski and Yael Kalai}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {97--123}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_4}, doi = {10.1007/978-3-030-45388-6\_4}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrakerskiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiSW20, author = {Ran Canetti and Pratik Sarkar and Xiao Wang}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Blazing Fast {OT} for Three-Round {UC} {OT} Extension}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {299--327}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_11}, doi = {10.1007/978-3-030-45388-6\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CanettiSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CaoOZ20, author = {Nairen Cao and Adam O'Neill and Mohammad Zaheri}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Toward {RSA-OAEP} Without Random Oracles}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {279--308}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_10}, doi = {10.1007/978-3-030-45374-9\_10}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CaoOZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CastagnosCLST20, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Bandwidth-Efficient Threshold {EC-DSA}}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {266--296}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_10}, doi = {10.1007/978-3-030-45388-6\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CastagnosCLST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoRFG20, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Irene Giacomelli}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Mon{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2\{k\}\}{\textdollar}a: Fast Maliciously Secure Two Party Computation on {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2\{k\}\}{\textdollar}}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {357--386}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_13}, doi = {10.1007/978-3-030-45388-6\_13}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoRFG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChaillouxD20, author = {Andr{\'{e}} Chailloux and Thomas Debris{-}Alazard}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {453--479}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_16}, doi = {10.1007/978-3-030-45388-6\_16}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChaillouxD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChakrabortyPW20, author = {Suvradip Chakraborty and Manoj Prabhakaran and Daniel Wichs}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Witness Maps and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {220--246}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_8}, doi = {10.1007/978-3-030-45374-9\_8}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChakrabortyPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChanPS20, author = {T.{-}H. Hubert Chan and Rafael Pass and Elaine Shi}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Sublinear-Round Byzantine Agreement Under Corrupt Majority}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {246--265}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_9}, doi = {10.1007/978-3-030-45388-6\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChanPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CostelloLNRV20, author = {Craig Costello and Patrick Longa and Michael Naehrig and Joost Renes and Fernando Virdia}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Improved Classical Cryptanalysis of {SIKE} in Practice}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {505--534}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_18}, doi = {10.1007/978-3-030-45388-6\_18}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CostelloLNRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DazaRZ20, author = {Vanesa Daza and Carla R{\`{a}}fols and Alexandros Zacharakis}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Updateable Inner Product Argument with Logarithmic Verifier and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {527--557}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_18}, doi = {10.1007/978-3-030-45374-9\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DazaRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DerlerSS20, author = {David Derler and Kai Samelin and Daniel Slamanig}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {462--492}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_16}, doi = {10.1007/978-3-030-45374-9\_16}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DerlerSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DowlingRS20, author = {Benjamin Dowling and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {341--373}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_12}, doi = {10.1007/978-3-030-45374-9\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DowlingRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DucasLW20, author = {L{\'{e}}o Ducas and Thijs Laarhoven and Wessel P. J. van Woerden}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {The Randomized Slicer for {CVPP:} Sharper, Faster, Smaller, Batchier}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {3--36}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_1}, doi = {10.1007/978-3-030-45388-6\_1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DucasLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FeoM20, author = {Luca De Feo and Michael Meyer}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Threshold Schemes from Isogeny Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {187--212}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_7}, doi = {10.1007/978-3-030-45388-6\_7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FeoM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FioreNP20, author = {Dario Fiore and Anca Nitulescu and David Pointcheval}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Boosting Verifiable Computation on Encrypted Data}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {124--154}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_5}, doi = {10.1007/978-3-030-45388-6\_5}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FioreNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GargGH20, author = {Sanjam Garg and Romain Gay and Mohammad Hajiabadi}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Master-Key KDM-Secure {IBE} from Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {123--152}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_5}, doi = {10.1007/978-3-030-45374-9\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GargGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Gay20, author = {Romain Gay}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {95--120}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_4}, doi = {10.1007/978-3-030-45374-9\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Gay20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GeniseMP020, author = {Nicholas Genise and Daniele Micciancio and Chris Peikert and Michael Walter}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {623--651}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_21}, doi = {10.1007/978-3-030-45374-9\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GeniseMP020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Guillevic20, author = {Aurore Guillevic}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {A Short-List of Pairing-Friendly Curves Resistant to Special {TNFS} at the 128-Bit Security Level}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {535--564}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_19}, doi = {10.1007/978-3-030-45388-6\_19}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Guillevic20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GuoKRS20, author = {Siyao Guo and Pritish Kamath and Alon Rosen and Katerina Sotiraki}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Limits on the Efficiency of (Ring) {LWE} Based Non-interactive Key Exchange}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {374--395}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_13}, doi = {10.1007/978-3-030-45374-9\_13}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GuoKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HaqueS20, author = {Abida Haque and Alessandra Scafuro}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Threshold Ring Signatures: New Definitions and Post-quantum Security}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {423--452}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_15}, doi = {10.1007/978-3-030-45388-6\_15}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HaqueS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HazaySV20, author = {Carmit Hazay and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {328--356}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_12}, doi = {10.1007/978-3-030-45388-6\_12}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HazaySV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HebantPP20, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Linearly-Homomorphic Signatures and Scalable Mix-Nets}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {597--627}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_21}, doi = {10.1007/978-3-030-45388-6\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HebantPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HovelmannsKSU20, author = {Kathrin H{\"{o}}velmanns and Eike Kiltz and Sven Sch{\"{a}}ge and Dominique Unruh}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {389--422}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_14}, doi = {10.1007/978-3-030-45388-6\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HovelmannsKSU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JiangGHNW20, author = {Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {396--427}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_14}, doi = {10.1007/978-3-030-45374-9\_14}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/JiangGHNW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KaafaraniKP20, author = {Ali {El Kaafarani} and Shuichi Katsumata and Federico Pintore}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional {CSIDH-512}}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {157--186}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_6}, doi = {10.1007/978-3-030-45388-6\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KaafaraniKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaVigneZMMMT20, author = {Rio LaVigne and Chen{-}Da Liu Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Topology-Hiding Computation for Networks with Unknown Delays}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {215--245}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_8}, doi = {10.1007/978-3-030-45388-6\_8}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaVigneZMMMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiLW20, author = {Qiqi Lai and Feng{-}Hao Liu and Zhedong Wang}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {652--681}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_22}, doi = {10.1007/978-3-030-45374-9\_22}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaiLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LangrehrP20, author = {Roman Langrehr and Jiaxin Pan}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Hierarchical Identity-Based Encryption with Tight Multi-challenge Security}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {153--183}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_6}, doi = {10.1007/978-3-030-45374-9\_6}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LangrehrP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PeikertS20, author = {Chris Peikert and Sina Shiehian}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Constraining and Watermarking PRFs from Milder Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {431--461}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_15}, doi = {10.1007/978-3-030-45374-9\_15}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PeikertS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Sanders20, author = {Olivier Sanders}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Efficient Redactable Signature and Application to Anonymous Credentials}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {628--656}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_22}, doi = {10.1007/978-3-030-45388-6\_22}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Sanders20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchageSL20, author = {Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk and Sebastian Lauer}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {567--596}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_20}, doi = {10.1007/978-3-030-45388-6\_20}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchageSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SoroushIRRR20, author = {Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Verifiable Inner Product Encryption Scheme}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {65--94}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_3}, doi = {10.1007/978-3-030-45374-9\_3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/SoroushIRRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SunSSLG20, author = {Shifeng Sun and Amin Sakzad and Ron Steinfeld and Joseph K. Liu and Dawu Gu}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Public-Key Puncturable Encryption: Modular and Compact Constructions}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {309--338}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_11}, doi = {10.1007/978-3-030-45374-9\_11}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/SunSSLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TomidaKN20, author = {Junichi Tomida and Yuto Kawahara and Ryo Nishimaki}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Fast, Compact, and Expressive Attribute-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {3--33}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_1}, doi = {10.1007/978-3-030-45374-9\_1}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TomidaKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Zhang0FZY20, author = {Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang and Kang Yang}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {37--65}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_2}, doi = {10.1007/978-3-030-45388-6\_2}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Zhang0FZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2020-1, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9}, doi = {10.1007/978-3-030-45374-9}, isbn = {978-3-030-45373-2}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2020-2, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6}, doi = {10.1007/978-3-030-45388-6}, isbn = {978-3-030-45387-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBKW19, author = {Michel Abdalla and Fabrice Benhamouda and Markulf Kohlweiss and Hendrik Waldner}, editor = {Dongdai Lin and Kazue Sako}, title = {Decentralizing Inner-Product Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {128--157}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_5}, doi = {10.1007/978-3-030-17259-6\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AttrapadungMNYY19, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Dongdai Lin and Kazue Sako}, title = {Adaptively Single-Key Secure Constrained PRFs for {\textbackslash}mathrm {NC1}}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {223--253}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_8}, doi = {10.1007/978-3-030-17259-6\_8}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AttrapadungMNYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BackesHHKP19, author = {Michael Backes and Lucjan Hanzlik and Amir Herzberg and Aniket Kate and Ivan Pryvalov}, editor = {Dongdai Lin and Kazue Sako}, title = {Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {286--313}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_10}, doi = {10.1007/978-3-030-17253-4\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BackesHHKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BeullensW19, author = {Ward Beullens and Hoeteck Wee}, editor = {Dongdai Lin and Kazue Sako}, title = {Obfuscating Simple Functionalities from Knowledge Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {254--283}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_9}, doi = {10.1007/978-3-030-17259-6\_9}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BeullensW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BultelLLMST19, author = {Xavier Bultel and Pascal Lafourcade and Russell W. F. Lai and Giulio Malavolta and Dominique Schr{\"{o}}der and Sri Aravinda Krishnan Thyagarajan}, editor = {Dongdai Lin and Kazue Sako}, title = {Efficient Invisible and Unlinkable Sanitizable Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {159--189}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_6}, doi = {10.1007/978-3-030-17253-4\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BultelLLMST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChowRTYZZ19, author = {Sherman S. M. Chow and Alexander Russell and Qiang Tang and Moti Yung and Yongjun Zhao and Hong{-}Sheng Zhou}, editor = {Dongdai Lin and Kazue Sako}, title = {Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {221--251}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_8}, doi = {10.1007/978-3-030-17253-4\_8}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChowRTYZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ClearM19, author = {Michael Clear and Ciaran McGoldrick}, editor = {Dongdai Lin and Kazue Sako}, title = {Additively Homomorphic {IBE} from Higher Residuosity}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {496--515}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_17}, doi = {10.1007/978-3-030-17253-4\_17}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ClearM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Cohen19, author = {Aloni Cohen}, editor = {Dongdai Lin and Kazue Sako}, title = {What About Bob? The Inadequacy of {CPA} Security for Proxy Reencryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {287--316}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_10}, doi = {10.1007/978-3-030-17259-6\_10}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Cohen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CouteauR19, author = {Geoffroy Couteau and Michael Reichle}, editor = {Dongdai Lin and Kazue Sako}, title = {Non-interactive Keyed-Verification Anonymous Credentials}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {66--96}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_3}, doi = {10.1007/978-3-030-17253-4\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CouteauR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DAnversGJNVV19, author = {Jan{-}Pieter D'Anvers and Qian Guo and Thomas Johansson and Alexander Nilsson and Frederik Vercauteren and Ingrid Verbauwhede}, editor = {Dongdai Lin and Kazue Sako}, title = {Decryption Failure Attacks on {IND-CCA} Secure Lattice-Based Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {565--598}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_19}, doi = {10.1007/978-3-030-17259-6\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DAnversGJNVV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledK19, author = {Dana Dachman{-}Soled and Mukul Kulkarni}, editor = {Dongdai Lin and Kazue Sako}, title = {Upper and Lower Bounds for Continuous Non-Malleable Codes}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {519--548}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_18}, doi = {10.1007/978-3-030-17253-4\_18}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DattaOT19, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Dongdai Lin and Kazue Sako}, title = {Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {127--158}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_5}, doi = {10.1007/978-3-030-17253-4\_5}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DattaOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DazaGPRS19, author = {Vanesa Daza and Alonso Gonz{\'{a}}lez and Zaira Pindado and Carla R{\`{a}}fols and Javier Silva}, editor = {Dongdai Lin and Kazue Sako}, title = {Shorter Quadratic {QA-NIZK} Proofs}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {314--343}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_11}, doi = {10.1007/978-3-030-17253-4\_11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DazaGPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FuchsbauerKKP19, author = {Georg Fuchsbauer and Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, editor = {Dongdai Lin and Kazue Sako}, title = {Adaptively Secure Proxy Re-encryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {317--346}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_11}, doi = {10.1007/978-3-030-17259-6\_11}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FuchsbauerKKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalbraithMP19, author = {Steven D. Galbraith and Jake Massimo and Kenneth G. Paterson}, editor = {Dongdai Lin and Kazue Sako}, title = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {379--407}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_13}, doi = {10.1007/978-3-030-17259-6\_13}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GalbraithMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GargHMRS19, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar}, editor = {Dongdai Lin and Kazue Sako}, title = {Registration-Based Encryption from Standard Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {63--93}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_3}, doi = {10.1007/978-3-030-17259-6\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GargHMRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GarmsL19, author = {Lydia Garms and Anja Lehmann}, editor = {Dongdai Lin and Kazue Sako}, title = {Group Signatures with Selective Linkability}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {190--220}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_7}, doi = {10.1007/978-3-030-17253-4\_7}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GarmsL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GeW19, author = {Aijun Ge and Puwen Wei}, editor = {Dongdai Lin and Kazue Sako}, title = {Identity-Based Broadcast Encryption with Efficient Revocation}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {405--435}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_14}, doi = {10.1007/978-3-030-17253-4\_14}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GeW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Gonzalez19, author = {Alonso Gonz{\'{a}}lez}, editor = {Dongdai Lin and Kazue Sako}, title = {Shorter Ring Signatures from Standard Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {99--126}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_4}, doi = {10.1007/978-3-030-17253-4\_4}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Gonzalez19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GoyalVW19, author = {Rishab Goyal and Satyanarayana Vusirikala and Brent Waters}, editor = {Dongdai Lin and Kazue Sako}, title = {Collusion Resistant Broadcast and Trace from Positional Witness Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {3--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_1}, doi = {10.1007/978-3-030-17259-6\_1}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GoyalVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HofheinzN19, author = {Dennis Hofheinz and Ngoc Khanh Nguyen}, editor = {Dongdai Lin and Kazue Sako}, title = {On Tightly Secure Primitives in the Multi-instance Setting}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {581--611}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_20}, doi = {10.1007/978-3-030-17253-4\_20}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HofheinzN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JiangZM19, author = {Haodong Jiang and Zhenfeng Zhang and Zhi Ma}, editor = {Dongdai Lin and Kazue Sako}, title = {Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {618--645}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_21}, doi = {10.1007/978-3-030-17259-6\_21}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/JiangZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KatsumataMT19, author = {Shuichi Katsumata and Takahiro Matsuda and Atsushi Takayasu}, editor = {Dongdai Lin and Kazue Sako}, title = {Lattice-Based Revocable (Hierarchical) {IBE} with Decryption Key Exposure Resistance}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {441--471}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_15}, doi = {10.1007/978-3-030-17259-6\_15}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/KatsumataMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KatsumataY19, author = {Shuichi Katsumata and Shota Yamada}, editor = {Dongdai Lin and Kazue Sako}, title = {Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, {DDH} and {DCR}}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {158--188}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_6}, doi = {10.1007/978-3-030-17259-6\_6}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KatsumataY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kohl19, author = {Lisa Kohl}, editor = {Dongdai Lin and Kazue Sako}, title = {Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {408--437}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_14}, doi = {10.1007/978-3-030-17259-6\_14}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Kohl19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KushilevitzM19, author = {Eyal Kushilevitz and Tamer Mour}, editor = {Dongdai Lin and Kazue Sako}, title = {Sub-logarithmic Distributed Oblivious {RAM} with Small Block Size}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {3--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_1}, doi = {10.1007/978-3-030-17253-4\_1}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KushilevitzM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LangrehrP19, author = {Roman Langrehr and Jiaxin Pan}, editor = {Dongdai Lin and Kazue Sako}, title = {Tightly Secure Hierarchical Identity-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {436--465}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_15}, doi = {10.1007/978-3-030-17253-4\_15}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LangrehrP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiXY19, author = {Zhe Li and Chaoping Xing and Sze Ling Yeo}, editor = {Dongdai Lin and Kazue Sako}, title = {Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {599--617}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_20}, doi = {10.1007/978-3-030-17259-6\_20}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertNTW19, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Benjamin Hong Meng Tan and Huaxiong Wang}, editor = {Dongdai Lin and Kazue Sako}, title = {Zero-Knowledge Elementary Databases with More Expressive Queries}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {255--285}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_9}, doi = {10.1007/978-3-030-17253-4\_9}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LibertNTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertQ19, author = {Beno{\^{\i}}t Libert and Chen Qian}, editor = {Dongdai Lin and Kazue Sako}, title = {Lossy Algebraic Filters with Short Tags}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {34--65}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_2}, doi = {10.1007/978-3-030-17253-4\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MatsudaTMH19, author = {Takahiro Matsuda and Kenta Takahashi and Takao Murakami and Goichiro Hanaoka}, editor = {Dongdai Lin and Kazue Sako}, title = {Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {549--580}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_19}, doi = {10.1007/978-3-030-17253-4\_19}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MatsudaTMH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MerzP19, author = {Simon{-}Philipp Merz and Christophe Petit}, editor = {Dongdai Lin and Kazue Sako}, title = {Factoring Products of Braids via Garside Normal Form}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {646--678}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_22}, doi = {10.1007/978-3-030-17259-6\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/MerzP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NishimakiY19, author = {Ryo Nishimaki and Takashi Yamakawa}, editor = {Dongdai Lin and Kazue Sako}, title = {Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {466--495}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_16}, doi = {10.1007/978-3-030-17253-4\_16}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NishimakiY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PatranabisMR19, author = {Sikhar Patranabis and Debdeep Mukhopadhyay and Somindu C. Ramanna}, editor = {Dongdai Lin and Kazue Sako}, title = {Function Private Predicate Encryption for Low Min-Entropy Predicates}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {189--219}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_7}, doi = {10.1007/978-3-030-17259-6\_7}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PatranabisMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PinoLS19, author = {Rafa{\"{e}}l del Pino and Vadim Lyubashevsky and Gregor Seiler}, editor = {Dongdai Lin and Kazue Sako}, title = {Short Discrete Log Proofs for {FHE} and Ring-LWE Ciphertexts}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {344--373}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_12}, doi = {10.1007/978-3-030-17253-4\_12}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PinoLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PorninP19, author = {Thomas Pornin and Thomas Prest}, editor = {Dongdai Lin and Kazue Sako}, title = {More Efficient Algorithms for the {NTRU} Key Generation Using the Field Norm}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {504--533}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_17}, doi = {10.1007/978-3-030-17259-6\_17}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PorninP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/RothblumSS19, author = {Ron D. Rothblum and Adam Sealfon and Katerina Sotiraki}, editor = {Dongdai Lin and Kazue Sako}, title = {Towards Non-Interactive Zero-Knowledge for {NP} from {LWE}}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {472--503}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_16}, doi = {10.1007/978-3-030-17259-6\_16}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/RothblumSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Scafuro19, author = {Alessandra Scafuro}, editor = {Dongdai Lin and Kazue Sako}, title = {Break-glass Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {34--62}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_2}, doi = {10.1007/978-3-030-17259-6\_2}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Scafuro19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ScafuroSV19, author = {Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti}, editor = {Dongdai Lin and Kazue Sako}, title = {Publicly Verifiable Proofs from Blockchains}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {374--401}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_13}, doi = {10.1007/978-3-030-17253-4\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ScafuroSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchneiderPOG19, author = {Tobias Schneider and Clara Paglialonga and Tobias Oder and Tim G{\"{u}}neysu}, editor = {Dongdai Lin and Kazue Sako}, title = {Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {534--564}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_18}, doi = {10.1007/978-3-030-17259-6\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchneiderPOG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangFL19, author = {Zhedong Wang and Xiong Fan and Feng{-}Hao Liu}, editor = {Dongdai Lin and Kazue Sako}, title = {{FE} for Inner Products and Its Application to Decentralized {ABE}}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {97--127}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_4}, doi = {10.1007/978-3-030-17259-6\_4}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WenLG19, author = {Yunhua Wen and Shengli Liu and Dawu Gu}, editor = {Dongdai Lin and Kazue Sako}, title = {Generic Constructions of Robustly Reusable Fuzzy Extractor}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {349--378}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_12}, doi = {10.1007/978-3-030-17259-6\_12}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WenLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2019-1, editor = {Dongdai Lin and Kazue Sako}, title = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4}, doi = {10.1007/978-3-030-17253-4}, isbn = {978-3-030-17252-7}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2019-2, editor = {Dongdai Lin and Kazue Sako}, title = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6}, doi = {10.1007/978-3-030-17259-6}, isbn = {978-3-030-17258-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0002S18, author = {Takahiro Matsuda and Jacob C. N. Schuldt}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Related Randomness Security for Public Key Encryption, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {280--311}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_10}, doi = {10.1007/978-3-319-76578-5\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/0002S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrikolaH18, author = {Thomas Agrikola and Dennis Hofheinz}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Interactively Secure Groups from Obfuscation}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {341--370}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_12}, doi = {10.1007/978-3-319-76581-5\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrikolaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AlamatiPS18, author = {Navid Alamati and Chris Peikert and Noah Stephens{-}Davidowitz}, editor = {Michel Abdalla and Ricardo Dahab}, title = {New (and Old) Proof Systems for Lattice Problems}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {619--643}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_21}, doi = {10.1007/978-3-319-76581-5\_21}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AlamatiPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AuerbachBK18, author = {Benedikt Auerbach and Mihir Bellare and Eike Kiltz}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {348--377}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_12}, doi = {10.1007/978-3-319-76578-5\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AuerbachBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AuerbachP18, author = {Benedikt Auerbach and Bertram Poettering}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Hashing Solutions Instead of Generating Problems: On the Interactive Certification of {RSA} Moduli}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {403--430}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_14}, doi = {10.1007/978-3-319-76581-5\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AuerbachP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BadertscherMT18, author = {Christian Badertscher and Ueli Maurer and Bj{\"{o}}rn Tackmann}, editor = {Michel Abdalla and Ricardo Dahab}, title = {On Composable Security for Digital Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {494--523}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_17}, doi = {10.1007/978-3-319-76578-5\_17}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BadertscherMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BenhamoudaBDQ18, author = {Fabrice Benhamouda and Olivier Blazy and L{\'{e}}o Ducas and Willy Quach}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Hash Proof Systems over Lattices Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {644--674}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_22}, doi = {10.1007/978-3-319-76581-5\_22}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BenhamoudaBDQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BootleG18, author = {Jonathan Bootle and Jens Groth}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {561--588}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_19}, doi = {10.1007/978-3-319-76581-5\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BootleG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrakerskiKSW18, author = {Zvika Brakerski and Elena Kirshanova and Damien Stehl{\'{e}} and Weiqiang Wen}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Learning with Errors and Extrapolated Dihedral Cosets}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {702--727}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_24}, doi = {10.1007/978-3-319-76581-5\_24}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrakerskiKSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BroadnaxFMR18, author = {Brandon Broadnax and Valerie Fetzer and J{\"{o}}rn M{\"{u}}ller{-}Quade and Andy Rupp}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Non-malleability vs. CCA-Security: The Case of Commitments}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {312--337}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_11}, doi = {10.1007/978-3-319-76581-5\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BroadnaxFMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChenHRSS18, author = {Ming{-}Shing Chen and Andreas H{\"{u}}lsing and Joost Rijneveld and Simona Samardjiska and Peter Schwabe}, editor = {Michel Abdalla and Ricardo Dahab}, title = {{SOFIA:} \emph{MQ} {MQ} -Based Signatures in the {QROM}}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {3--33}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_1}, doi = {10.1007/978-3-319-76581-5\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ChenHRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledKS18, author = {Dana Dachman{-}Soled and Mukul Kulkarni and Aria Shahverdi}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Local Non-malleable Codes in the Bounded Retrieval Model}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {281--311}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_10}, doi = {10.1007/978-3-319-76581-5\_10}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardLOSS18, author = {Ivan Damg{\aa}rd and Ji Luo and Sabine Oechsner and Peter Scholl and Mark Simkin}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Compact Zero-Knowledge Proofs of Small Hamming Weight}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {530--560}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_18}, doi = {10.1007/978-3-319-76581-5\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardLOSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DataP18, author = {Deepesh Data and Manoj Prabhakaran}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Towards Characterizing Securely Computable Two-Party Randomized Functions}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {675--697}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_23}, doi = {10.1007/978-3-319-76578-5\_23}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DataP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DattaOT18, author = {Pratish Datta and Tatsuaki Okamoto and Junichi Tomida}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {245--277}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_9}, doi = {10.1007/978-3-319-76581-5\_9}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DattaOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DengSY018, author = {Yi Deng and Xuyang Song and Jingyue Yu and Yu Chen}, editor = {Michel Abdalla and Ricardo Dahab}, title = {On the Security of Classic Protocols for Unique Witness Relations}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {589--615}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_20}, doi = {10.1007/978-3-319-76581-5\_20}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DengSY018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DerlerKLRSS18, author = {David Derler and Stephan Krenn and Thomas Lor{\"{u}}nser and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {219--250}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_8}, doi = {10.1007/978-3-319-76578-5\_8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DerlerKLRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DorozHPSSWZ18, author = {Yarkin Dor{\"{o}}z and Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman and Berk Sunar and William Whyte and Zhenfei Zhang}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Fully Homomorphic Encryption from the Finite Field Isomorphism Problem}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {125--155}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_5}, doi = {10.1007/978-3-319-76578-5\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DorozHPSSWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DottlingGHM18, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny}, editor = {Michel Abdalla and Ricardo Dahab}, title = {New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {3--31}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_1}, doi = {10.1007/978-3-319-76578-5\_1}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DottlingGHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FanT18, author = {Xiong Fan and Qiang Tang}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Making Public Key Functional Encryption Function Private, Distributively}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {218--244}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_8}, doi = {10.1007/978-3-319-76581-5\_8}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FanT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FarshimHHL18, author = {Pooya Farshim and Julia Hesse and Dennis Hofheinz and Enrique Larraia}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Graded Encoding Schemes from Obfuscation}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {371--400}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_13}, doi = {10.1007/978-3-319-76581-5\_13}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FarshimHHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FrederiksenPY18, author = {Tore Kasper Frederiksen and Benny Pinkas and Avishay Yanai}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Committed {MPC} - Maliciously Secure Multiparty Computation from Homomorphic Commitments}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {587--619}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_20}, doi = {10.1007/978-3-319-76578-5\_20}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FrederiksenPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Fuchsbauer18, author = {Georg Fuchsbauer}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Subversion-Zero-Knowledge SNARKs}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {315--347}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_11}, doi = {10.1007/978-3-319-76578-5\_11}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Fuchsbauer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FuchsbauerG18, author = {Georg Fuchsbauer and Romain Gay}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Weakly Secure Equivalence-Class Signatures from Standard Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {153--183}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_6}, doi = {10.1007/978-3-319-76581-5\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FuchsbauerG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GaneshKPS18, author = {Chaya Ganesh and Yashvanth Kondi and Arpita Patra and Pratik Sarkar}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {499--529}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_17}, doi = {10.1007/978-3-319-76581-5\_17}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GaneshKPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GarayKLP18, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos and Giorgos Panagiotakos}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Bootstrapping the Blockchain, with Applications to Consensus and Fast {PKI} Setup}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {465--495}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_16}, doi = {10.1007/978-3-319-76581-5\_16}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GarayKLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GentryOR18, author = {Craig Gentry and Adam O'Neill and Leonid Reyzin}, editor = {Michel Abdalla and Ricardo Dahab}, title = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {34--57}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_2}, doi = {10.1007/978-3-319-76581-5\_2}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GentryOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GiaconHP18, author = {Federico Giacon and Felix Heuer and Bertram Poettering}, editor = {Michel Abdalla and Ricardo Dahab}, title = {{KEM} Combiners}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {190--218}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_7}, doi = {10.1007/978-3-319-76578-5\_7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GiaconHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GiaconKP18, author = {Federico Giacon and Eike Kiltz and Bertram Poettering}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Hybrid Encryption in a Multi-user Setting, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {159--189}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_6}, doi = {10.1007/978-3-319-76578-5\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GiaconKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HamlinSWW18, author = {Ariel Hamlin and Abhi Shelat and Mor Weiss and Daniel Wichs}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Multi-Key Searchable Encryption, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {95--124}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_4}, doi = {10.1007/978-3-319-76578-5\_4}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HamlinSWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HartKMPPQ18, author = {Daniel Hart and DoHoon Kim and Giacomo Micheli and Guillermo Pascual{-}Perez and Christophe Petit and Yuxuan Quek}, editor = {Michel Abdalla and Ricardo Dahab}, title = {A Practical Cryptanalysis of WalnutDSA {TM}}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {381--406}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_13}, doi = {10.1007/978-3-319-76578-5\_13}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HartKMPPQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HeroldKL18, author = {Gottfried Herold and Elena Kirshanova and Thijs Laarhoven}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Speed-Ups and Time-Memory Trade-Offs for Tuple Lattice Sieving}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {407--436}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_14}, doi = {10.1007/978-3-319-76578-5\_14}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HeroldKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuangLCAPL18, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {253--279}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_9}, doi = {10.1007/978-3-319-76578-5\_9}, timestamp = {Mon, 20 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuangLCAPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Hulsing0S18, author = {Andreas H{\"{u}}lsing and Tanja Lange and Kit Smeets}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {728--757}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_25}, doi = {10.1007/978-3-319-76581-5\_25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Hulsing0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IshaiMO18, author = {Yuval Ishai and Manika Mittal and Rafail Ostrovsky}, editor = {Michel Abdalla and Ricardo Dahab}, title = {On the Message Complexity of Secure Multiparty Computation}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {698--711}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_24}, doi = {10.1007/978-3-319-76578-5\_24}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IshaiMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Jarecki18, author = {Stanislaw Jarecki}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Efficient Covert Two-Party Computation}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {644--674}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_22}, doi = {10.1007/978-3-319-76578-5\_22}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Jarecki18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JareckiKSS18, author = {Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Two-Factor Authentication with End-to-End Password Security}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {431--461}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_15}, doi = {10.1007/978-3-319-76581-5\_15}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JareckiKSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JutlaO018, author = {Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Improved (Almost) Tightly-Secure Structure-Preserving Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {123--152}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_5}, doi = {10.1007/978-3-319-76581-5\_5}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JutlaO018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KaafaraniK18, author = {Ali {El Kaafarani} and Shuichi Katsumata}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Attribute-Based Signatures for Unbounded Circuits in the {ROM} and Efficient Instantiations from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {89--119}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_4}, doi = {10.1007/978-3-319-76581-5\_4}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KaafaraniK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KitagawaNT18, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Simple and Generic Constructions of Succinct Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {187--217}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_7}, doi = {10.1007/978-3-319-76581-5\_7}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KitagawaNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KitagawaT18, author = {Fuyuki Kitagawa and Keisuke Tanaka}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {32--61}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_2}, doi = {10.1007/978-3-319-76578-5\_2}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KitagawaT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiM18, author = {Baiyu Li and Daniele Micciancio}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Equational Security Proofs of Oblivious Transfer Protocols}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {527--553}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_18}, doi = {10.1007/978-3-319-76578-5\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LindellY18, author = {Yehuda Lindell and Avishay Yanai}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Fast Garbling of Circuits over 3-Valued Logic}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {620--643}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_21}, doi = {10.1007/978-3-319-76578-5\_21}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LindellY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LingNWX18, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Constant-Size Group Signatures from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {58--88}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_3}, doi = {10.1007/978-3-319-76581-5\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LingNWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LyuLHG18, author = {Lin Lyu and Shengli Liu and Shuai Han and Dawu Gu}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Tightly {SIM-SO-CCA} Secure Public Key Encryption from Standard Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {62--92}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_3}, doi = {10.1007/978-3-319-76578-5\_3}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LyuLHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MechlerMN18, author = {Jeremias Mechler and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Reusing Tamper-Proof Hardware in UC-Secure Protocols}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {463--493}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_16}, doi = {10.1007/978-3-319-76578-5\_16}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MechlerMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PeikertS18, author = {Chris Peikert and Sina Shiehian}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Privately Constraining and Programming PRFs, the {LWE} Way}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {675--701}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_23}, doi = {10.1007/978-3-319-76581-5\_23}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PeikertS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Scholl18, author = {Peter Scholl}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {554--583}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_19}, doi = {10.1007/978-3-319-76578-5\_19}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Scholl18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TeruyaKH18, author = {Tadanori Teruya and Kenji Kashiwabara and Goichiro Hanaoka}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {437--460}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_15}, doi = {10.1007/978-3-319-76578-5\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/TeruyaKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2018-1, editor = {Michel Abdalla and Ricardo Dahab}, title = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5}, doi = {10.1007/978-3-319-76578-5}, isbn = {978-3-319-76577-8}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2018-2, editor = {Michel Abdalla and Ricardo Dahab}, title = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5}, doi = {10.1007/978-3-319-76581-5}, isbn = {978-3-319-76580-8}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0001J17, author = {Taechan Kim and Jinhyuck Jeong}, editor = {Serge Fehr}, title = {Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {388--408}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_16}, doi = {10.1007/978-3-662-54365-8\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/0001J17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0021GW17, author = {Jie Chen and Junqing Gong and Jian Weng}, editor = {Serge Fehr}, title = {Tightly Secure {IBE} Under Constant-Size Master Public Key}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {207--231}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_9}, doi = {10.1007/978-3-662-54365-8\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/0021GW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBP17, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, editor = {Serge Fehr}, title = {Removing Erasures with Explainable Hash Proof Systems}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {151--174}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_7}, doi = {10.1007/978-3-662-54365-8\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbrahamFNP017, author = {Ittai Abraham and Christopher W. Fletcher and Kartik Nayak and Benny Pinkas and Ling Ren}, editor = {Serge Fehr}, title = {Asymptotically Tight Bounds for Composing {ORAM} with {PIR}}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {91--120}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_5}, doi = {10.1007/978-3-662-54365-8\_5}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbrahamFNP017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Attrapadung17, author = {Nuttapong Attrapadung}, editor = {Serge Fehr}, title = {Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) {ABE} for Unbounded-Size Circuits}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {3--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_1}, doi = {10.1007/978-3-662-54388-7\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Attrapadung17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellarePS17, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, editor = {Serge Fehr}, title = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {121--151}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_5}, doi = {10.1007/978-3-662-54388-7\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellarePS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BenarrochBL17, author = {Daniel Benarroch and Zvika Brakerski and Tancr{\`{e}}de Lepoint}, editor = {Serge Fehr}, title = {{FHE} over the Integers: Decomposed and Batched in the Post-Quantum Regime}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {271--301}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_10}, doi = {10.1007/978-3-662-54388-7\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BenarrochBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BenhamoudaBL17, author = {Fabrice Benhamouda and Florian Bourse and Helger Lipmaa}, editor = {Serge Fehr}, title = {CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {36--66}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_2}, doi = {10.1007/978-3-662-54388-7\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BenhamoudaBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BonehLW17, author = {Dan Boneh and Kevin Lewi and David J. Wu}, editor = {Serge Fehr}, title = {Constraining Pseudorandom Functions Privately}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {494--524}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_17}, doi = {10.1007/978-3-662-54388-7\_17}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BonehLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrzuskaJ17, author = {Chris Brzuska and H{\aa}kon Jacobsen}, editor = {Serge Fehr}, title = {A Modular Security Analysis of {EAP} and {IEEE} 802.11}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {335--365}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_12}, doi = {10.1007/978-3-662-54388-7\_12}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrzuskaJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CamenischDKPSS17, author = {Jan Camenisch and David Derler and Stephan Krenn and Henrich C. P{\"{o}}hls and Kai Samelin and Daniel Slamanig}, editor = {Serge Fehr}, title = {Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {152--182}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_6}, doi = {10.1007/978-3-662-54388-7\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CamenischDKPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiPV17, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Serge Fehr}, title = {Better Two-Round Adaptive Multi-party Computation}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {396--427}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_14}, doi = {10.1007/978-3-662-54388-7\_14}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CanettiPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiRRV17, author = {Ran Canetti and Srinivasan Raghuraman and Silas Richelson and Vinod Vaikuntanathan}, editor = {Serge Fehr}, title = {Chosen-Ciphertext Secure Fully Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {213--240}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_8}, doi = {10.1007/978-3-662-54388-7\_8}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CanettiRRV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChongchitmateO17, author = {Wutichai Chongchitmate and Rafail Ostrovsky}, editor = {Serge Fehr}, title = {Circuit-Private Multi-key {FHE}}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {241--270}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_9}, doi = {10.1007/978-3-662-54388-7\_9}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ChongchitmateO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronLLT17, author = {Jean{-}S{\'{e}}bastien Coron and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Serge Fehr}, title = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {41--58}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_3}, doi = {10.1007/978-3-662-54365-8\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CoronLLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledKS17, author = {Dana Dachman{-}Soled and Mukul Kulkarni and Aria Shahverdi}, editor = {Serge Fehr}, title = {Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {310--332}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_13}, doi = {10.1007/978-3-662-54365-8\_13}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DattaDM17, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Serge Fehr}, title = {Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {463--493}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_16}, doi = {10.1007/978-3-662-54388-7\_16}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DattaDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaonioN017, author = {Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi}, editor = {Serge Fehr}, title = {Predictable Arguments of Knowledge}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {121--150}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_6}, doi = {10.1007/978-3-662-54365-8\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FaonioN017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaonioN17, author = {Antonio Faonio and Jesper Buus Nielsen}, editor = {Serge Fehr}, title = {Non-malleable Codes with Split-State Refresh}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {279--309}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_12}, doi = {10.1007/978-3-662-54365-8\_12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FaonioN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaonioN17a, author = {Antonio Faonio and Jesper Buus Nielsen}, editor = {Serge Fehr}, title = {Fully Leakage-Resilient Codes}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {333--358}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_14}, doi = {10.1007/978-3-662-54365-8\_14}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FaonioN17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FuchsbauerGKO17, author = {Georg Fuchsbauer and Romain Gay and Lucas Kowalczyk and Claudio Orlandi}, editor = {Serge Fehr}, title = {Access Control Encryption for Equality, Comparison, and More}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {88--118}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_4}, doi = {10.1007/978-3-662-54388-7\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FuchsbauerGKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GoyalKW17, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, editor = {Serge Fehr}, title = {Separating {IND-CPA} and Circular Security for Unbounded Length Key Cycles}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {232--246}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_10}, doi = {10.1007/978-3-662-54365-8\_10}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GoyalKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HazayPV17, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, editor = {Serge Fehr}, title = {Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {428--460}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_15}, doi = {10.1007/978-3-662-54388-7\_15}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HazayPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HazayV17, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Serge Fehr}, title = {Scalable Multi-party Private Set-Intersection}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {175--203}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_8}, doi = {10.1007/978-3-662-54365-8\_8}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HazayV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Herold017, author = {Gottfried Herold and Alexander May}, editor = {Serge Fehr}, title = {{LP} Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix {LWE}}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {3--15}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_1}, doi = {10.1007/978-3-662-54365-8\_1}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Herold017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HeroldK17, author = {Gottfried Herold and Elena Kirshanova}, editor = {Serge Fehr}, title = {Improved Algorithms for the Approximate k-List Problem in Euclidean Norm}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {16--40}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_2}, doi = {10.1007/978-3-662-54365-8\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HeroldK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ItkisSVWY17, author = {Gene Itkis and Emily Shen and Mayank Varia and David Wilson and Arkady Yerukhimovich}, editor = {Serge Fehr}, title = {Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {67--87}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_3}, doi = {10.1007/978-3-662-54388-7\_3}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ItkisSVWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Jutla017, author = {Charanjit S. Jutla and Arnab Roy}, editor = {Serge Fehr}, title = {Improved Structure Preserving Signatures Under Standard Bilinear Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {183--209}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_7}, doi = {10.1007/978-3-662-54388-7\_7}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Jutla017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kiayias0Z17, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Serge Fehr}, title = {Ceremonies for End-to-End Verifiable Elections}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {305--334}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_11}, doi = {10.1007/978-3-662-54388-7\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Kiayias0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KoppulaPW17, author = {Venkata Koppula and Andrew Poelstra and Brent Waters}, editor = {Serge Fehr}, title = {Universal Samplers with Fast Verification}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {525--554}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_18}, doi = {10.1007/978-3-662-54388-7\_18}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/KoppulaPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertPQ17, author = {Beno{\^{\i}}t Libert and Thomas Peters and Chen Qian}, editor = {Serge Fehr}, title = {Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {247--276}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_11}, doi = {10.1007/978-3-662-54365-8\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertPQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NielsenR17, author = {Jesper Buus Nielsen and Samuel Ranellucci}, editor = {Serge Fehr}, title = {On the Computational Overhead of {MPC} with Dishonest Majority}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {369--395}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_13}, doi = {10.1007/978-3-662-54388-7\_13}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/NielsenR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PointchevalST17, author = {David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, editor = {Serge Fehr}, title = {Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {61--90}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_4}, doi = {10.1007/978-3-662-54365-8\_4}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/PointchevalST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Shani17, author = {Barak Shani}, editor = {Serge Fehr}, title = {On the Bit Security of Elliptic Curve Diffie-Hellman}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {361--387}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_15}, doi = {10.1007/978-3-662-54365-8\_15}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Shani17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Villar17, author = {Jorge L. Villar}, editor = {Serge Fehr}, title = {Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {435--464}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_18}, doi = {10.1007/978-3-662-54365-8\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Villar17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YuXW17, author = {Yang Yu and Guangwu Xu and Xiaoyun Wang}, editor = {Serge Fehr}, title = {Provably Secure {NTRU} Instances over Prime Cyclotomic Rings}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {409--434}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_17}, doi = {10.1007/978-3-662-54365-8\_17}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/YuXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2017-1, editor = {Serge Fehr}, title = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8}, doi = {10.1007/978-3-662-54365-8}, isbn = {978-3-662-54364-1}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2017-2, editor = {Serge Fehr}, title = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7}, doi = {10.1007/978-3-662-54388-7}, isbn = {978-3-662-54387-0}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0002H16, author = {Takahiro Matsuda and Goichiro Hanaoka}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {3--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_1}, doi = {10.1007/978-3-662-49384-7\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/0002H16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BackesMS16, author = {Michael Backes and Sebastian Meiser and Dominique Schr{\"{o}}der}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Delegatable Functional Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {357--386}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_14}, doi = {10.1007/978-3-662-49384-7\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BackesMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Ben-SassonBDIR16, author = {Eli Ben{-}Sasson and Iddo Bentov and Ivan Damg{\aa}rd and Yuval Ishai and Noga Ron{-}Zewi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On Public Key Encryption from Noisy Codewords}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {417--446}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_16}, doi = {10.1007/978-3-662-49387-8\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Ben-SassonBDIR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BenhamoudaCTV16, author = {Fabrice Benhamouda and C{\'{e}}line Chevalier and Adrian Thillard and Damien Vergnaud}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {36--66}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_3}, doi = {10.1007/978-3-662-49387-8\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BenhamoudaCTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BernhardFW16, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On the Hardness of Proving CCA-Security of Signed ElGamal}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {47--69}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_3}, doi = {10.1007/978-3-662-49384-7\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BernhardFW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BishopP16, author = {Allison Bishop and Valerio Pastro}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Robust Secret Sharing Schemes Against Local Adversaries}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {327--356}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_13}, doi = {10.1007/978-3-662-49387-8\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BishopP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Brandao16, author = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Very-Efficient Simulatable Flipping of Many Coins into a Well - (and a New Universally-Composable Commitment Scheme)}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {297--326}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_12}, doi = {10.1007/978-3-662-49387-8\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Brandao16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CamenischDL16, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Universally Composable Direct Anonymous Attestation}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {234--264}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_10}, doi = {10.1007/978-3-662-49387-8\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CamenischDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiSV16, author = {Ran Canetti and Daniel Shahaf and Margarita Vald}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Universally Composable Authentication and Key-Exchange with Global {PKI}}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {265--296}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_11}, doi = {10.1007/978-3-662-49387-8\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CanettiSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CaroIO16, author = {Angelo De Caro and Vincenzo Iovino and Adam O'Neill}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Deniable Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {196--222}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_8}, doi = {10.1007/978-3-662-49384-7\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CaroIO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChandranRV16, author = {Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Reducing Depth in Constrained PRFs: From Bit-Fixing to {\textbackslash}mathbf {NC1}}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {359--385}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_14}, doi = {10.1007/978-3-662-49387-8\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChandranRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChenQZDC16, author = {Yu Chen and Baodong Qin and Jiang Zhang and Yi Deng and Sherman S. M. Chow}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Non-Malleable Functions and Their Applications}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {386--416}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_15}, doi = {10.1007/978-3-662-49387-8\_15}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChenQZDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Cohen16, author = {Ran Cohen}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Asynchronous Secure Multiparty Computation in Constant Time}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {183--207}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_8}, doi = {10.1007/978-3-662-49387-8\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Cohen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledGL16, author = {Dana Dachman{-}Soled and S. Dov Gordon and Feng{-}Hao Liu and Adam O'Neill and Hong{-}Sheng Zhou}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Leakage-Resilient Public-Key Encryption from Obfuscation}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {101--128}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_5}, doi = {10.1007/978-3-662-49387-8\_5}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardPR16, author = {Ivan Damg{\aa}rd and Antigoni Polychroniadou and Vanishree Rao}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Adaptively Secure Multi-Party Computation from {LWE} (via Equivocal {FHE)}}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {208--233}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_9}, doi = {10.1007/978-3-662-49387-8\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DattaDM16, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Functional Encryption for Inner Product with Full Function Privacy}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {164--195}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_7}, doi = {10.1007/978-3-662-49384-7\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DattaDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustMV16, author = {Sebastian Faust and Daniel Masny and Daniele Venturi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Chosen-Ciphertext Security from Subset Sum}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {35--46}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_2}, doi = {10.1007/978-3-662-49384-7\_2}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaustMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FleischhackerKM16, author = {Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schr{\"{o}}der and Mark Simkin}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {301--330}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_12}, doi = {10.1007/978-3-662-49384-7\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FleischhackerKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Gong0DCT16, author = {Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Extended Nested Dual System Groups, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {133--163}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_6}, doi = {10.1007/978-3-662-49384-7\_6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Gong0DCT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HajiabadiKS16, author = {Mohammad Hajiabadi and Bruce M. Kapron and Venkatesh Srinivasan}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {129--158}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_6}, doi = {10.1007/978-3-662-49387-8\_6}, timestamp = {Thu, 22 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HajiabadiKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HartungKKKR16, author = {Gunnar Hartung and Bj{\"{o}}rn Kaidel and Alexander Koch and Jessica Koch and Andy Rupp}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Fault-Tolerant Aggregate Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {331--356}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_13}, doi = {10.1007/978-3-662-49384-7\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HartungKKKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HulsingR016, author = {Andreas H{\"{u}}lsing and Joost Rijneveld and Fang Song}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Mitigating Multi-target Attacks in Hash-Based Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {387--416}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_15}, doi = {10.1007/978-3-662-49384-7\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HulsingR016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HulsingRS16, author = {Andreas H{\"{u}}lsing and Joost Rijneveld and Peter Schwabe}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {ARMed {SPHINCS} - Computing a 41 {KB} Signature in 16 {KB} of {RAM}}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {446--470}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_17}, doi = {10.1007/978-3-662-49384-7\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HulsingRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Joye16, author = {Marc Joye}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Identity-Based Cryptosystems and Quadratic Residuosity}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {225--254}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_9}, doi = {10.1007/978-3-662-49384-7\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Joye16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kitagawa0HT16, author = {Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {99--129}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_5}, doi = {10.1007/978-3-662-49384-7\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Kitagawa0HT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KruppSSFAN16, author = {Johannes Krupp and Dominique Schr{\"{o}}der and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan N{\"{u}}rnberger}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Nearly Optimal Verifiable Data Streaming}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {417--445}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_16}, doi = {10.1007/978-3-662-49384-7\_16}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KruppSSFAN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiDMSW16, author = {Junzuo Lai and Robert H. Deng and Changshe Ma and Kouichi Sakurai and Jian Weng}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {CCA-Secure Keyed-Fully Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {70--98}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_4}, doi = {10.1007/978-3-662-49384-7\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LaiDMSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LinPST16, author = {Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Indistinguishability Obfuscation with Non-trivial Efficiency}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {447--462}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_17}, doi = {10.1007/978-3-662-49387-8\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LinPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NevesT16, author = {Samuel Neves and Mehdi Tibouchi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {19--35}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_2}, doi = {10.1007/978-3-662-49387-8\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/NevesT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PetitKM16, author = {Christophe Petit and Michiel Kosters and Ange Messeng}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {3--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_1}, doi = {10.1007/978-3-662-49387-8\_1}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/PetitKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SakaiAH16, author = {Yusuke Sakai and Nuttapong Attrapadung and Goichiro Hanaoka}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Attribute-Based Signatures for Circuits from Bilinear Map}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {283--300}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_11}, doi = {10.1007/978-3-662-49384-7\_11}, timestamp = {Mon, 21 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SakaiAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TakayasuK16, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {How to Generalize {RSA} Cryptanalyses}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {67--97}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_4}, doi = {10.1007/978-3-662-49387-8\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TakayasuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WatanabeS16, author = {Yohei Watanabe and Junji Shikata}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {255--279}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_10}, doi = {10.1007/978-3-662-49384-7\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WatanabeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Wee16, author = {Hoeteck Wee}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {KDM-Security via Homomorphic Smooth Projective Hashing}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {159--179}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_7}, doi = {10.1007/978-3-662-49387-8\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Wee16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2016-1, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7}, doi = {10.1007/978-3-662-49384-7}, isbn = {978-3-662-49383-0}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2016-2, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8}, doi = {10.1007/978-3-662-49387-8}, isbn = {978-3-662-49386-1}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP15, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, editor = {Jonathan Katz}, title = {Simple Functional Encryption Schemes for Inner Products}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {733--751}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_33}, doi = {10.1007/978-3-662-46447-2\_33}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, editor = {Jonathan Katz}, title = {Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {332--352}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_15}, doi = {10.1007/978-3-662-46447-2\_15}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalABKPS15, author = {Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai}, editor = {Jonathan Katz}, title = {On the Practical Security of Inner Product Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {777--798}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_35}, doi = {10.1007/978-3-662-46447-2\_35}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalABKPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Alperin-Sheriff15, author = {Jacob Alperin{-}Sheriff}, editor = {Jonathan Katz}, title = {Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {236--255}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_11}, doi = {10.1007/978-3-662-46447-2\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Alperin-Sheriff15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaldimtsiCFK15, author = {Foteini Baldimtsi and Melissa Chase and Georg Fuchsbauer and Markulf Kohlweiss}, editor = {Jonathan Katz}, title = {Anonymous Transferable E-Cash}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {101--124}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_5}, doi = {10.1007/978-3-662-46447-2\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BaldimtsiCFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BartheFFSST15, author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Mehdi Tibouchi}, editor = {Jonathan Katz}, title = {Strongly-Optimal Structure Preserving Signatures from Type {II} Pairings: Synthesis and Lower Bounds}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {355--376}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_16}, doi = {10.1007/978-3-662-46447-2\_16}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BartheFFSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellareDK15, author = {Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi}, editor = {Jonathan Katz}, title = {How Secure is Deterministic Encryption?}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {52--73}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_3}, doi = {10.1007/978-3-662-46447-2\_3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellareDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellareH15, author = {Mihir Bellare and Viet Tung Hoang}, editor = {Jonathan Katz}, title = {Adaptive Witness Encryption and Asymmetric Password-Based Cryptography}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {308--331}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_14}, doi = {10.1007/978-3-662-46447-2\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellareH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellareK15, author = {Mihir Bellare and Sriram Keelveedhi}, editor = {Jonathan Katz}, title = {Interactive Message-Locked Encryption and Secure Deduplication}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {516--538}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_23}, doi = {10.1007/978-3-662-46447-2\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellareK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BergsmaJS15, author = {Florian Bergsma and Tibor Jager and J{\"{o}}rg Schwenk}, editor = {Jonathan Katz}, title = {One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {477--494}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_21}, doi = {10.1007/978-3-662-46447-2\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BergsmaJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BernhardFW15, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, editor = {Jonathan Katz}, title = {Adaptive Proofs of Knowledge in the Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {629--649}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_28}, doi = {10.1007/978-3-662-46447-2\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BernhardFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BlazyKKP15, author = {Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan}, editor = {Jonathan Katz}, title = {Tightly-Secure Signatures from Chameleon Hash Functions}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {256--279}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_12}, doi = {10.1007/978-3-662-46447-2\_12}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BlazyKKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CamenischEN15, author = {Jan Camenisch and Robert R. Enderlein and Gregory Neven}, editor = {Jonathan Katz}, title = {Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {283--307}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_13}, doi = {10.1007/978-3-662-46447-2\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CamenischEN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanardPST15, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, editor = {Jonathan Katz}, title = {Divisible E-Cash Made Practical}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {77--100}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_4}, doi = {10.1007/978-3-662-46447-2\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CanardPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CascudoDDGNT15, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo Machado David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti}, editor = {Jonathan Katz}, title = {Additively Homomorphic {UC} Commitments with Optimal Amortized Overhead}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {495--515}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_22}, doi = {10.1007/978-3-662-46447-2\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CascudoDDGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CashDK15, author = {David Cash and Rafael Dowsley and Eike Kiltz}, editor = {Jonathan Katz}, title = {Digital Signatures from Strong {RSA} without Prime Generation}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {217--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_10}, doi = {10.1007/978-3-662-46447-2\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CashDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChaidosG15, author = {Pyrros Chaidos and Jens Groth}, editor = {Jonathan Katz}, title = {Making Sigma-Protocols Non-interactive Without Random Oracles}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {650--670}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_29}, doi = {10.1007/978-3-662-46447-2\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChaidosG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CouvreurOTG15, author = {Alain Couvreur and Ayoub Otmani and Jean{-}Pierre Tillich and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a}, editor = {Jonathan Katz}, title = {A Polynomial-Time Attack on the {BBCRS} Scheme}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {175--193}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_8}, doi = {10.1007/978-3-662-46447-2\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CouvreurOTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dottling15, author = {Nico D{\"{o}}ttling}, editor = {Jonathan Katz}, title = {Low Noise {LPN:} {KDM} Secure Public Key Encryption and Sample Amplification}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {604--626}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_27}, doi = {10.1007/978-3-662-46447-2\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dottling15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaugereGPST15, author = {Jean{-}Charles Faug{\`{e}}re and Danilo Gligoroski and Ludovic Perret and Simona Samardjiska and Enrico Thomae}, editor = {Jonathan Katz}, title = {A Polynomial-Time Key-Recovery Attack on {MQQ} Cryptosystems}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {150--174}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_7}, doi = {10.1007/978-3-662-46447-2\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaugereGPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustMNV15, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, editor = {Jonathan Katz}, title = {A Tamper and Leakage Resilient von Neumann Architecture}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {579--603}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_26}, doi = {10.1007/978-3-662-46447-2\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaustMNV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GayMW15, author = {Romain Gay and Pierrick M{\'{e}}aux and Hoeteck Wee}, editor = {Jonathan Katz}, title = {Predicate Encryption for Multi-dimensional Range Queries from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {752--776}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_34}, doi = {10.1007/978-3-662-46447-2\_34}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GayMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GrangerS15, author = {Robert Granger and Michael Scott}, editor = {Jonathan Katz}, title = {Faster {ECC} over {\textbackslash}mathbb F{\_}2521-1}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {539--553}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_24}, doi = {10.1007/978-3-662-46447-2\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GrangerS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HeuerJKS15, author = {Felix Heuer and Tibor Jager and Eike Kiltz and Sven Sch{\"{a}}ge}, editor = {Jonathan Katz}, title = {On the Selective Opening Security of Practical Public-Key Encryption Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {27--51}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_2}, doi = {10.1007/978-3-662-46447-2\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HeuerJKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HiromasaAO15, author = {Ryo Hiromasa and Masayuki Abe and Tatsuaki Okamoto}, editor = {Jonathan Katz}, title = {Packing Messages and Optimizing Bootstrapping in {GSW-FHE}}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {699--715}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_31}, doi = {10.1007/978-3-662-46447-2\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HiromasaAO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HofheinzKS15, author = {Dennis Hofheinz and Jessica Koch and Christoph Striecks}, editor = {Jonathan Katz}, title = {Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {799--822}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_36}, doi = {10.1007/978-3-662-46447-2\_36}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HofheinzKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KijimaM15, author = {Shuji Kijima and Ravi Montenegro}, editor = {Jonathan Katz}, title = {Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {127--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_6}, doi = {10.1007/978-3-662-46447-2\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KijimaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LewkoM15, author = {Allison B. Lewko and Sarah Meiklejohn}, editor = {Jonathan Katz}, title = {A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {377--398}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_17}, doi = {10.1007/978-3-662-46447-2\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LewkoM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertJYP15, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, editor = {Jonathan Katz}, title = {Secure Efficient History-Hiding Append-Only Signatures in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {450--473}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_20}, doi = {10.1007/978-3-662-46447-2\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertJYP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LingNW15, author = {San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Jonathan Katz}, title = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {427--449}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_19}, doi = {10.1007/978-3-662-46447-2\_19}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LingNW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuP15, author = {Shengli Liu and Kenneth G. Paterson}, editor = {Jonathan Katz}, title = {Simulation-Based Selective Opening {CCA} Security for {PKE} from Key Encapsulation Mechanisms}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {3--26}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_1}, doi = {10.1007/978-3-662-46447-2\_1}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LiuP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LyubashevskyW15, author = {Vadim Lyubashevsky and Daniel Wichs}, editor = {Jonathan Katz}, title = {Simple Lattice Trapdoor Sampling from a Broad Class of Distributions}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {716--730}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_32}, doi = {10.1007/978-3-662-46447-2\_32}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LyubashevskyW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NguyenZZ15, author = {Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang}, editor = {Jonathan Katz}, title = {Simpler Efficient Group Signatures from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {401--426}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_18}, doi = {10.1007/978-3-662-46447-2\_18}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NguyenZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OrsiniPS15, author = {Emmanuela Orsini and Joop van de Pol and Nigel P. Smart}, editor = {Jonathan Katz}, title = {Bootstrapping {BGV} Ciphertexts with a Wider Choice of p and q}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {673--698}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_30}, doi = {10.1007/978-3-662-46447-2\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OrsiniPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PenaFP15, author = {Marta Conde Pena and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, editor = {Jonathan Katz}, title = {Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {194--213}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_9}, doi = {10.1007/978-3-662-46447-2\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PenaFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/QinLYDC15, author = {Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen}, editor = {Jonathan Katz}, title = {Continuous Non-malleable Key Derivation and Its Application to Related-Key Security}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {557--578}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_25}, doi = {10.1007/978-3-662-46447-2\_25}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/QinLYDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2015, editor = {Jonathan Katz}, title = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2}, doi = {10.1007/978-3-662-46447-2}, isbn = {978-3-662-46446-5}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0002H14, author = {Takahiro Matsuda and Goichiro Hanaoka}, editor = {Hugo Krawczyk}, title = {Chosen Ciphertext Security via {UCE}}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {56--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_4}, doi = {10.1007/978-3-642-54631-0\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/0002H14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AlbrechtFFP14, author = {Martin R. Albrecht and Jean{-}Charles Faug{\`{e}}re and Robert Fitzpatrick and Ludovic Perret}, editor = {Hugo Krawczyk}, title = {Lazy Modulus Switching for the {BKW} Algorithm on {LWE}}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {429--445}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_25}, doi = {10.1007/978-3-642-54631-0\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AlbrechtFFP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AlbrechtFFPTX14, author = {Martin R. Albrecht and Jean{-}Charles Faug{\`{e}}re and Robert Fitzpatrick and Ludovic Perret and Yosuke Todo and Keita Xagawa}, editor = {Hugo Krawczyk}, title = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {446--464}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_26}, doi = {10.1007/978-3-642-54631-0\_26}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AlbrechtFFPTX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AnanthCGKO14, author = {Prabhanjan Ananth and Nishanth Chandran and Vipul Goyal and Bhavana Kanukurthi and Rafail Ostrovsky}, editor = {Hugo Krawczyk}, title = {Achieving Privacy in Verifiable Computation with Multiple Servers - Without {FHE} and without Pre-processing}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {149--166}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_9}, doi = {10.1007/978-3-642-54631-0\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AnanthCGKO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AponKST14, author = {Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam}, editor = {Hugo Krawczyk}, title = {Verifiable Oblivious Storage}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {131--148}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_8}, doi = {10.1007/978-3-642-54631-0\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AponKST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ArmknechtGKP14, author = {Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter}, editor = {Hugo Krawczyk}, title = {General Impossibility of Group Homomorphic Encryption in the Quantum World}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {556--573}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_32}, doi = {10.1007/978-3-642-54631-0\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ArmknechtGKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BarbulescuBDGJTVZ14, author = {Razvan Barbulescu and Cyril Bouvier and J{\'{e}}r{\'{e}}mie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thom{\'{e}} and Marion Videau and Paul Zimmermann}, editor = {Hugo Krawczyk}, title = {Discrete Logarithm in {GF(2809)} with {FFS}}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {221--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_13}, doi = {10.1007/978-3-642-54631-0\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BarbulescuBDGJTVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellareF14, author = {Mihir Bellare and Georg Fuchsbauer}, editor = {Hugo Krawczyk}, title = {Policy-Based Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {520--537}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_30}, doi = {10.1007/978-3-642-54631-0\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellareF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BiCFNRZ14, author = {Jingguo Bi and Jean{-}S{\'{e}}bastien Coron and Jean{-}Charles Faug{\`{e}}re and Phong Q. Nguyen and Gu{\'{e}}na{\"{e}}l Renault and Rina Zeitoun}, editor = {Hugo Krawczyk}, title = {Rounding and Chaining {LLL:} Finding Faster Small Roots of Univariate Polynomial Congruences}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {185--202}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_11}, doi = {10.1007/978-3-642-54631-0\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BiCFNRZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BohlDH14, author = {Florian B{\"{o}}hl and Gareth T. Davies and Dennis Hofheinz}, editor = {Hugo Krawczyk}, title = {Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {483--500}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_28}, doi = {10.1007/978-3-642-54631-0\_28}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BohlDH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BosCM14, author = {Joppe W. Bos and Craig Costello and Andrea Miele}, editor = {Hugo Krawczyk}, title = {Elliptic and Hyperelliptic Curves: {A} Practical Security Analysis}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {203--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_12}, doi = {10.1007/978-3-642-54631-0\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BosCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoyleGI14, author = {Elette Boyle and Shafi Goldwasser and Ioana Ivan}, editor = {Hugo Krawczyk}, title = {Functional Signatures and Pseudorandom Functions}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {501--519}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_29}, doi = {10.1007/978-3-642-54631-0\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoyleGI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanardPS14, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders}, editor = {Hugo Krawczyk}, title = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {167--184}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_10}, doi = {10.1007/978-3-642-54631-0\_10}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CanardPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiPPT14, author = {Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos}, editor = {Hugo Krawczyk}, title = {Verifiable Set Operations over Outsourced Databases}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {113--130}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_7}, doi = {10.1007/978-3-642-54631-0\_7}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CanettiPPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoFGN14, author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo}, editor = {Hugo Krawczyk}, title = {Generalizing Homomorphic MACs for Arithmetic Circuits}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {538--555}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_31}, doi = {10.1007/978-3-642-54631-0\_31}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoFGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChandranCLNX14, author = {Nishanth Chandran and Melissa Chase and Feng{-}Hao Liu and Ryo Nishimaki and Keita Xagawa}, editor = {Hugo Krawczyk}, title = {Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: {A} Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {95--112}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_6}, doi = {10.1007/978-3-642-54631-0\_6}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChandranCLNX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChoGO14, author = {Chongwon Cho and Sanjam Garg and Rafail Ostrovsky}, editor = {Hugo Krawczyk}, title = {Cross-Domain Secure Computation}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {650--668}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_37}, doi = {10.1007/978-3-642-54631-0\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChoGO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronLT14, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Hugo Krawczyk}, title = {Scale-Invariant Fully Homomorphic Encryption over the Integers}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {311--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_18}, doi = {10.1007/978-3-642-54631-0\_18}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CoronLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-Soled14, author = {Dana Dachman{-}Soled}, editor = {Hugo Krawczyk}, title = {A Black-Box Construction of a {CCA2} Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {37--55}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_3}, doi = {10.1007/978-3-642-54631-0\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-Soled14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-Soled14a, author = {Dana Dachman{-}Soled}, editor = {Hugo Krawczyk}, title = {On Minimal Assumptions for Sender-Deniable Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {574--591}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_33}, doi = {10.1007/978-3-642-54631-0\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-Soled14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledFMO14, author = {Dana Dachman{-}Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill}, editor = {Hugo Krawczyk}, title = {Enhanced Chosen-Ciphertext Security and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {329--344}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_19}, doi = {10.1007/978-3-642-54631-0\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledFMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/EscalaG14, author = {Alex Escala and Jens Groth}, editor = {Hugo Krawczyk}, title = {Fine-Tuning Groth-Sahai Proofs}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {630--649}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_36}, doi = {10.1007/978-3-642-54631-0\_36}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/EscalaG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/EscalaHLR14, author = {Alex Escala and Javier Herranz and Beno{\^{\i}}t Libert and Carla R{\`{a}}fols}, editor = {Hugo Krawczyk}, title = {Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {239--256}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_14}, doi = {10.1007/978-3-642-54631-0\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/EscalaHLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HohenbergerW14, author = {Susan Hohenberger and Brent Waters}, editor = {Hugo Krawczyk}, title = {Online/Offline Attribute-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {293--310}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_17}, doi = {10.1007/978-3-642-54631-0\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HohenbergerW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuPZ14, author = {Gengran Hu and Yanbin Pan and Feng Zhang}, editor = {Hugo Krawczyk}, title = {Solving Random Subset Sum Problem by l p -norm {SVP} Oracle}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {399--410}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_23}, doi = {10.1007/978-3-642-54631-0\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IshiguroKMT14, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, editor = {Hugo Krawczyk}, title = {Parallel Gauss Sieve Algorithm: Solving the {SVP} Challenge over a 128-Dimensional Ideal Lattice}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {411--428}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_24}, doi = {10.1007/978-3-642-54631-0\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IshiguroKMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Jarecki14, author = {Stanislaw Jarecki}, editor = {Hugo Krawczyk}, title = {Practical Covert Authentication}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {611--629}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_35}, doi = {10.1007/978-3-642-54631-0\_35}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Jarecki14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KiltzMP14, author = {Eike Kiltz and Daniel Masny and Krzysztof Pietrzak}, editor = {Hugo Krawczyk}, title = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_1}, doi = {10.1007/978-3-642-54631-0\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KiltzMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kirshanova14, author = {Elena Kirshanova}, editor = {Hugo Krawczyk}, title = {Proxy Re-encryption from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {77--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_5}, doi = {10.1007/978-3-642-54631-0\_5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Kirshanova14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LangloisLNW14, author = {Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Hugo Krawczyk}, title = {Lattice-Based Group Signature Scheme with Verifier-Local Revocation}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {345--361}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_20}, doi = {10.1007/978-3-642-54631-0\_20}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LangloisLNW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiSYKS14, author = {Yong Li and Sven Sch{\"{a}}ge and Zheng Yang and Florian Kohlar and J{\"{o}}rg Schwenk}, editor = {Hugo Krawczyk}, title = {On the Security of the Pre-shared Key Ciphersuites of {TLS}}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {669--684}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_38}, doi = {10.1007/978-3-642-54631-0\_38}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiSYKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertYJP14, author = {Beno{\^{\i}}t Libert and Moti Yung and Marc Joye and Thomas Peters}, editor = {Hugo Krawczyk}, title = {Traceable Group Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {592--610}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_34}, doi = {10.1007/978-3-642-54631-0\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertYJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NielsenVZ14, author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel}, editor = {Hugo Krawczyk}, title = {Leakage-Resilient Signatures with Graceful Degradation}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {362--379}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_21}, doi = {10.1007/978-3-642-54631-0\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NielsenVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PatersonSS14, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn}, editor = {Hugo Krawczyk}, title = {Related Randomness Attacks for Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {465--482}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_27}, doi = {10.1007/978-3-642-54631-0\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PatersonSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/QinL14, author = {Baodong Qin and Shengli Liu}, editor = {Hugo Krawczyk}, title = {Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {19--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_2}, doi = {10.1007/978-3-642-54631-0\_2}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/QinL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Seurin14, author = {Yannick Seurin}, editor = {Hugo Krawczyk}, title = {On the Lossiness of the Rabin Trapdoor Function}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {380--398}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_22}, doi = {10.1007/978-3-642-54631-0\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Seurin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TessaroW14, author = {Stefano Tessaro and David A. Wilson}, editor = {Hugo Krawczyk}, title = {Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {257--274}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_15}, doi = {10.1007/978-3-642-54631-0\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TessaroW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YamadaAHK14, author = {Shota Yamada and Nuttapong Attrapadung and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Hugo Krawczyk}, title = {A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {275--292}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_16}, doi = {10.1007/978-3-642-54631-0\_16}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YamadaAHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2014, editor = {Hugo Krawczyk}, title = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0}, doi = {10.1007/978-3-642-54631-0}, isbn = {978-3-642-54630-3}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaHP13, author = {Michel Abdalla and Fabrice Ben Hamouda and David Pointcheval}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Tighter Reductions for Forward-Secure Signature Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {292--311}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_19}, doi = {10.1007/978-3-642-36362-7\_19}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbeDKNO13, author = {Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {312--331}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_20}, doi = {10.1007/978-3-642-36362-7\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbeDKNO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AttrapadungLP13, author = {Nuttapong Attrapadung and Beno{\^{\i}}t Libert and Thomas Peters}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {386--404}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_24}, doi = {10.1007/978-3-642-36362-7\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AttrapadungLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BarbosaF13, author = {Manuel Barbosa and Pooya Farshim}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {On the Semantic Security of Functional Encryption Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {143--161}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_10}, doi = {10.1007/978-3-642-36362-7\_10}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BarbosaF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BarbuBDGRRZ13, author = {Guillaume Barbu and Alberto Battistello and Guillaume Dabosville and Christophe Giraud and Gu{\'{e}}na{\"{e}}l Renault and Soline Renner and Rina Zeitoun}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Combined Attack on {CRT-RSA} - Why Public Verification Must Not Be Public?}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {198--215}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_13}, doi = {10.1007/978-3-642-36362-7\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BarbuBDGRRZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrakerskiGH13, author = {Zvika Brakerski and Craig Gentry and Shai Halevi}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Packed Ciphertexts in LWE-Based Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {1--13}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_1}, doi = {10.1007/978-3-642-36362-7\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrakerskiGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoF13, author = {Dario Catalano and Dario Fiore}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Vector Commitments and Their Applications}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {55--72}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_5}, doi = {10.1007/978-3-642-36362-7\_5}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChaseKLM13, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Verifiable Elections That Scale for Free}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {479--496}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_29}, doi = {10.1007/978-3-642-36362-7\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChaseKLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChoiKWZ13, author = {Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong{-}Sheng Zhou}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global {CRS}}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {73--88}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_6}, doi = {10.1007/978-3-642-36362-7\_6}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChoiKWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DagdelenMV13, author = {{\"{O}}zg{\"{u}}r Dagdelen and Payman Mohassel and Daniele Venturi}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Rate-Limited Secure Function Evaluation: Definitions and Constructions}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {461--478}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_28}, doi = {10.1007/978-3-642-36362-7\_28}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DagdelenMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/EmuraHO0Y13, author = {Keita Emura and Goichiro Hanaoka and Go Ohtake and Takahiro Matsuda and Shota Yamada}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {32--50}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_3}, doi = {10.1007/978-3-642-36362-7\_3}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/EmuraHO0Y13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FarshimLPQ13, author = {Pooya Farshim and Beno{\^{\i}}t Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Robust Encryption, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {352--368}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_22}, doi = {10.1007/978-3-642-36362-7\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FarshimLPQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FreireHKP13, author = {Eduarda S. V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Non-Interactive Key Exchange}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {254--271}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_17}, doi = {10.1007/978-3-642-36362-7\_17}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FreireHKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HamoudaBCPV13, author = {Fabrice Ben Hamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {272--291}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_18}, doi = {10.1007/978-3-642-36362-7\_18}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HamoudaBCPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HohenbergerW13, author = {Susan Hohenberger and Brent Waters}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Attribute-Based Encryption with Fast Decryption}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {162--179}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_11}, doi = {10.1007/978-3-642-36362-7\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HohenbergerW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuangLQ13, author = {Zhengan Huang and Shengli Liu and Baodong Qin}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {369--385}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_23}, doi = {10.1007/978-3-642-36362-7\_23}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuangLQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KatzTZ13, author = {Jonathan Katz and Aishwarya Thiruvengadam and Hong{-}Sheng Zhou}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {14--31}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_2}, doi = {10.1007/978-3-642-36362-7\_2}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KatzTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KumarasubramanianOPW13, author = {Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Cryptography Using Captcha Puzzles}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {89--106}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_7}, doi = {10.1007/978-3-642-36362-7\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KumarasubramanianOPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KunihiroSI13, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and Errors}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {180--197}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_12}, doi = {10.1007/978-3-642-36362-7\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KunihiroSI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LeeLY13, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {423--442}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_26}, doi = {10.1007/978-3-642-36362-7\_26}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LeeLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Lindell13, author = {Yehuda Lindell}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Techniques for Efficient Secure Computation Based on Yao's Protocol}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {253}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_16}, doi = {10.1007/978-3-642-36362-7\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Lindell13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LingNSW13, author = {San Ling and Khoa Nguyen and Damien Stehl{\'{e}} and Huaxiong Wang}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Improved Zero-Knowledge Proofs of Knowledge for the {ISIS} Problem, and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {107--124}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_8}, doi = {10.1007/978-3-642-36362-7\_8}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LingNSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MatsudaH13, author = {Takahiro Matsuda and Goichiro Hanaoka}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {332--351}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_21}, doi = {10.1007/978-3-642-36362-7\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MatsudaH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NielsenVZ13, author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {On the Connection between Leakage Tolerance and Adaptive Security}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {497--515}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_30}, doi = {10.1007/978-3-642-36362-7\_30}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/NielsenVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NishimakiX13, author = {Ryo Nishimaki and Keita Xagawa}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted {VES}}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {405--422}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_25}, doi = {10.1007/978-3-642-36362-7\_25}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NishimakiX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OkamotoT13, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Decentralized Attribute-Based Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {125--142}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_9}, doi = {10.1007/978-3-642-36362-7\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OkamotoT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SeoE13, author = {Jae Hong Seo and Keita Emura}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Revocable Identity-Based Encryption Revisited: Security Model and Construction}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {216--234}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_14}, doi = {10.1007/978-3-642-36362-7\_14}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SeoE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Seurin13, author = {Yannick Seurin}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {New Constructions and Applications of Trapdoor {DDH} Groups}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {443--460}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_27}, doi = {10.1007/978-3-642-36362-7\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Seurin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Waters13, author = {Brent Waters}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Functional Encryption: Origins and Recent Developments}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {51--54}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_4}, doi = {10.1007/978-3-642-36362-7\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Waters13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Xagawa13, author = {Keita Xagawa}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Improved (Hierarchical) Inner-Product Encryption from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {235--252}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_15}, doi = {10.1007/978-3-642-36362-7\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Xagawa13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2013, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7}, doi = {10.1007/978-3-642-36362-7}, isbn = {978-3-642-36361-0}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaFL12, author = {Michel Abdalla and Dario Fiore and Vadim Lyubashevsky}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {From Selective to Full Security: Semi-generic Transformations in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {316--333}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_19}, doi = {10.1007/978-3-642-30057-8\_19}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalBVVW12, author = {Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Functional Encryption for Threshold Functions (or Fuzzy {IBE)} from Lattices}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {280--297}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_17}, doi = {10.1007/978-3-642-30057-8\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalBVVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Alperin-SheriffP12, author = {Jacob Alperin{-}Sheriff and Chris Peikert}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Circular and {KDM} Security for Identity-Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {334--352}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_20}, doi = {10.1007/978-3-642-30057-8\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Alperin-SheriffP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BauerVZ12, author = {Aur{\'{e}}lie Bauer and Damien Vergnaud and Jean{-}Christophe Zapalowicz}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {609--626}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_36}, doi = {10.1007/978-3-642-30057-8\_36}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BauerVZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BohlHK12, author = {Florian B{\"{o}}hl and Dennis Hofheinz and Daniel Kraschewski}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {On Definitions of Selective Opening Security}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {522--539}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_31}, doi = {10.1007/978-3-642-30057-8\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BohlHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiDVW12, author = {Ran Canetti and Dana Dachman{-}Soled and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Efficient Password Authenticated Key Exchange via Oblivious Transfer}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {449--466}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_27}, doi = {10.1007/978-3-642-30057-8\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CanettiDVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CashGH12, author = {David Cash and Matthew Green and Susan Hohenberger}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {New Definitions and Separations for Circular Security}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {540--557}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_32}, doi = {10.1007/978-3-642-30057-8\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CashGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoFW12, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Efficient Network Coding Signatures in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {680--696}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_40}, doi = {10.1007/978-3-642-30057-8\_40}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoFW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CayrelHP12, author = {Pierre{-}Louis Cayrel and Gerhard Hoffmann and Edoardo Persichetti}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {138--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_9}, doi = {10.1007/978-3-642-30057-8\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CayrelHP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ClavierFTP12, author = {Christophe Clavier and Benoit Feix and Lo{\"{\i}}c Thierry and Pascal Paillier}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Generating Provable Primes Efficiently on Embedded Devices}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {372--389}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_22}, doi = {10.1007/978-3-642-30057-8\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ClavierFTP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CramerDKZZ12, author = {Ronald Cramer and Ivan Damg{\aa}rd and Eike Kiltz and Sarah Zakarias and Angela Zottarel}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {DDH-Like Assumptions Based on Extension Rings}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {644--661}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_38}, doi = {10.1007/978-3-642-30057-8\_38}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CramerDKZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DucasD12, author = {L{\'{e}}o Ducas and Alain Durmus}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Ring-LWE in Polynomial Rings}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {34--51}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_3}, doi = {10.1007/978-3-642-30057-8\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DucasD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FazioP12, author = {Nelly Fazio and Irippuge Milinda Perera}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {225--242}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_14}, doi = {10.1007/978-3-642-30057-8\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FazioP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Freeman12, author = {David Mandell Freeman}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Improved Security for Linearly Homomorphic Signatures: {A} Generic Framework}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {697--714}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_41}, doi = {10.1007/978-3-642-30057-8\_41}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Freeman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FujiokaSXY12, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {467--484}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_28}, doi = {10.1007/978-3-642-30057-8\_28}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FujiokaSXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Better Bootstrapping in Fully Homomorphic Encryption}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_1}, doi = {10.1007/978-3-642-30057-8\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HemenwayLO12, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Correlated Product Security from Any One-Way Function}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {558--575}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_33}, doi = {10.1007/978-3-642-30057-8\_33}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HemenwayLO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HemenwayO12, author = {Brett Hemenway and Rafail Ostrovsky}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {On Homomorphic Encryption and Chosen-Ciphertext Security}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {52--65}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_4}, doi = {10.1007/978-3-642-30057-8\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HemenwayO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HemenwayO12a, author = {Brett Hemenway and Rafail Ostrovsky}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Extended-DDH and Lossy Trapdoor Functions}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {627--643}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_37}, doi = {10.1007/978-3-642-30057-8\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HemenwayO12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Herold12, author = {Gottfried Herold}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Polly Cracker, Revisited, Revisited}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {17--33}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_2}, doi = {10.1007/978-3-642-30057-8\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Herold12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HofheinzJK12, author = {Dennis Hofheinz and Tibor Jager and Edward Knapp}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Waters Signatures with Optimal Security Reduction}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {66--83}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_5}, doi = {10.1007/978-3-642-30057-8\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HofheinzJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuangLY12, author = {Yun{-}Ju Huang and Feng{-}Hao Liu and Bo{-}Yin Yang}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Public-Key Cryptography from New Multivariate Quadratic Assumptions}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {190--205}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_12}, doi = {10.1007/978-3-642-30057-8\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuangLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuangWS12, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {120--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_8}, doi = {10.1007/978-3-642-30057-8\_8}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuangWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JumaVY12, author = {Ali Juma and Yevgeniy Vahlis and Moti Yung}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Multi-location Leakage Resilient Cryptography}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {504--521}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_30}, doi = {10.1007/978-3-642-30057-8\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JumaVY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JutlaR12, author = {Charanjit S. Jutla and Arnab Roy}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Relatively-Sound NIZKs and Password-Based Key-Exchange}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {485--503}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_29}, doi = {10.1007/978-3-642-30057-8\_29}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JutlaR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertPQ12, author = {Beno{\^{\i}}t Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {206--224}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_13}, doi = {10.1007/978-3-642-30057-8\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertPQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MatsudaHM12, author = {Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {576--594}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_34}, doi = {10.1007/978-3-642-30057-8\_34}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MatsudaHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ParampalliRT12, author = {Udaya Parampalli and Kim Ramchen and Vanessa Teague}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Efficiently Shuffling in Public}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {431--448}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_26}, doi = {10.1007/978-3-642-30057-8\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ParampalliRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Pointcheval12, author = {David Pointcheval}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Password-Based Authenticated Key Exchange}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {390--397}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_23}, doi = {10.1007/978-3-642-30057-8\_23}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Pointcheval12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/RamannaCS12, author = {Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract)}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {298--315}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_18}, doi = {10.1007/978-3-642-30057-8\_18}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/RamannaCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SakaiSEHO12, author = {Yusuke Sakai and Jacob C. N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {715--732}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_42}, doi = {10.1007/978-3-642-30057-8\_42}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SakaiSEHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SakemiHITY12, author = {Yumi Sakemi and Goichiro Hanaoka and Tetsuya Izu and Masahiko Takenaka and Masaya Yasuda}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {595--608}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_35}, doi = {10.1007/978-3-642-30057-8\_35}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SakemiHITY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Sakumoto12, author = {Koichi Sakumoto}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Public-Key Identification Schemes Based on Multivariate Cubic Polynomials}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {172--189}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_11}, doi = {10.1007/978-3-642-30057-8\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Sakumoto12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Schage12, author = {Sven Sch{\"{a}}ge}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Strong Security from Probabilistic Signature Schemes}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {84--101}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_6}, doi = {10.1007/978-3-642-30057-8\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Schage12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchroderU12, author = {Dominique Schr{\"{o}}der and Dominique Unruh}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Security of Blind Signatures Revisited}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {662--679}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_39}, doi = {10.1007/978-3-642-30057-8\_39}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchroderU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SeoCK12, author = {Jae Hong Seo and Jung Hee Cheon and Jonathan Katz}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Constant-Round Multi-party Private Set Union Using Reversed Laurent Series}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {398--412}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_24}, doi = {10.1007/978-3-642-30057-8\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SeoCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/StefanovSS12, author = {Emil Stefanov and Elaine Shi and Dawn Song}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {413--430}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_25}, doi = {10.1007/978-3-642-30057-8\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/StefanovSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SteinfeldLPTW12, author = {Ron Steinfeld and San Ling and Josef Pieprzyk and Christophe Tartary and Huaxiong Wang}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {{NTRUCCA:} How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {353--371}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_21}, doi = {10.1007/978-3-642-30057-8\_21}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SteinfeldLPTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ThomaeW12, author = {Enrico Thomae and Christopher Wolf}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {156--171}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_10}, doi = {10.1007/978-3-642-30057-8\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ThomaeW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Wee12, author = {Hoeteck Wee}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Public Key Encryption against Related Key Attacks}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {262--279}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_16}, doi = {10.1007/978-3-642-30057-8\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Wee12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YamadaASSHK12, author = {Shota Yamada and Nuttapong Attrapadung and Bagus Santoso and Jacob C. N. Schuldt and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Verifiable Predicate Encryption and Applications to {CCA} Security and Anonymous Predicate Authentication}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {243--261}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_15}, doi = {10.1007/978-3-642-30057-8\_15}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/YamadaASSHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YamadaHK12, author = {Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Space Efficient Signature Schemes from the {RSA} Assumption}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {102--119}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_7}, doi = {10.1007/978-3-642-30057-8\_7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YamadaHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2012, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8}, doi = {10.1007/978-3-642-30057-8}, isbn = {978-3-642-30056-1}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AcarN11, author = {Tolga Acar and Lan Nguyen}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Revocation for Delegatable Anonymous Credentials}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {423--440}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_26}, doi = {10.1007/978-3-642-19379-8\_26}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AcarN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AtenieseCT11, author = {Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {(If) Size Matters: Size-Hiding Private Set Intersection}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {156--173}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_10}, doi = {10.1007/978-3-642-19379-8\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AtenieseCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AttrapadungL11, author = {Nuttapong Attrapadung and Beno{\^{\i}}t Libert}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Homomorphic Network Coding Signatures in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {17--34}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_2}, doi = {10.1007/978-3-642-19379-8\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AttrapadungL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AttrapadungLP11, author = {Nuttapong Attrapadung and Beno{\^{\i}}t Libert and Elie de Panafieu}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {90--108}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_6}, doi = {10.1007/978-3-642-19379-8\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AttrapadungLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AvanziH11, author = {Roberto Maria Avanzi and Clemens Heuberger}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {109--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_7}, doi = {10.1007/978-3-642-19379-8\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AvanziH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BernsteinLS11, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {On the Correct Use of the Negation Map in the Pollard rho Method}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {128--146}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_8}, doi = {10.1007/978-3-642-19379-8\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BernsteinLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BettaleFP11, author = {Luk Bettale and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Cryptanalysis of Multivariate and Odd-Characteristic {HFE} Variants}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {441--458}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_27}, doi = {10.1007/978-3-642-19379-8\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BettaleFP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BhattacharyyaM11, author = {Rishiraj Bhattacharyya and Avradip Mandal}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {On the Impossibility of Instantiating {PSS} in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {351--368}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_22}, doi = {10.1007/978-3-642-19379-8\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BhattacharyyaM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BlazyFPV11, author = {Olivier Blazy and Georg Fuchsbauer and David Pointcheval and Damien Vergnaud}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Signatures on Randomizable Ciphertexts}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {403--422}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_25}, doi = {10.1007/978-3-642-19379-8\_25}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BlazyFPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BonehF11, author = {Dan Boneh and David Mandell Freeman}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {1--16}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_1}, doi = {10.1007/978-3-642-19379-8\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BonehF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BouillaguetFFP11, author = {Charles Bouillaguet and Jean{-}Charles Faug{\`{e}}re and Pierre{-}Alain Fouque and Ludovic Perret}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {473--493}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_29}, doi = {10.1007/978-3-642-19379-8\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BouillaguetFFP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CamenischDNZ11, author = {Jan Camenisch and Maria Dubovitskaya and Gregory Neven and Gregory M. Zaverucha}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Oblivious Transfer with Hidden Access Control Policies}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {192--209}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_12}, doi = {10.1007/978-3-642-19379-8\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CamenischDNZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronJMNT11, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {147--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_9}, doi = {10.1007/978-3-642-19379-8\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CoronJMNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DuboisK11, author = {Vivien Dubois and Jean{-}Gabriel Kammerer}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {459--472}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_28}, doi = {10.1007/978-3-642-19379-8\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DuboisK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Green11, author = {Matthew Green}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Secure Blind Decryption}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {265--282}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_16}, doi = {10.1007/978-3-642-19379-8\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Green11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HaleviK11, author = {Shai Halevi and Hugo Krawczyk}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {One-Pass {HMQV} and Asymmetric Key-Wrapping}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {317--334}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_20}, doi = {10.1007/978-3-642-19379-8\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HaleviK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiDL11, author = {Junzuo Lai and Robert H. Deng and Shengli Liu}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {228--245}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_14}, doi = {10.1007/978-3-642-19379-8\_14}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaiDL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MatsudaM11, author = {Takahiro Matsuda and Kanta Matsuura}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {246--264}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_15}, doi = {10.1007/978-3-642-19379-8\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MatsudaM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MeiLLJ11, author = {Qixiang Mei and Bao Li and Xianhui Lu and Dingding Jia}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {210--227}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_13}, doi = {10.1007/978-3-642-19379-8\_13}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MeiLLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OkamotoT11, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {35--52}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_3}, doi = {10.1007/978-3-642-19379-8\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OkamotoT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PetzoldtBB11, author = {Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Linear Recurring Sequences for the {UOV} Key Generation}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {335--350}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_21}, doi = {10.1007/978-3-642-19379-8\_21}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/PetzoldtBB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SahaiS11, author = {Amit Sahai and Hakan Seyalioglu}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Fully Secure Accountable-Authority Identity-Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {296--316}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_19}, doi = {10.1007/978-3-642-19379-8\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SahaiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchuldtM11, author = {Jacob C. N. Schuldt and Kanta Matsuura}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {On-line Non-transferable Signatures Revisited}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {369--386}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_23}, doi = {10.1007/978-3-642-19379-8\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchuldtM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Seo11, author = {Jae Hong Seo}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {387--402}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_24}, doi = {10.1007/978-3-642-19379-8\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Seo11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Toft11, author = {Tomas Toft}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Sub-linear, Secure Comparison with Two Non-colluding Parties}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {174--191}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_11}, doi = {10.1007/978-3-642-19379-8\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Toft11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Vaikuntanathan11, author = {Vinod Vaikuntanathan}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {New Developments in Leakage-Resilient Cryptography}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {283}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_17}, doi = {10.1007/978-3-642-19379-8\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Vaikuntanathan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Waters11, author = {Brent Waters}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {53--70}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_4}, doi = {10.1007/978-3-642-19379-8\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Waters11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WengZH11, author = {Jian Weng and Yunlei Zhao and Goichiro Hanaoka}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {On the Security of a Bidirectional Proxy Re-encryption Scheme from {PKC} 2010}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {284--295}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_18}, doi = {10.1007/978-3-642-19379-8\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/WengZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YamadaAHK11, author = {Shota Yamada and Nuttapong Attrapadung and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {71--89}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_5}, doi = {10.1007/978-3-642-19379-8\_5}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YamadaAHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2011, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8}, doi = {10.1007/978-3-642-19379-8}, isbn = {978-3-642-19378-1}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalBBF10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Preventing Pollution Attacks in Multi-source Network Coding}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {161--176}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_10}, doi = {10.1007/978-3-642-13013-7\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalBBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AttrapadungL10, author = {Nuttapong Attrapadung and Beno{\^{\i}}t Libert}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {384--402}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_23}, doi = {10.1007/978-3-642-13013-7\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AttrapadungL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BagherzandiJ10, author = {Ali Bagherzandi and Stanislaw Jarecki}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Identity-Based Aggregate and Multi-Signature Schemes Based on {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {480--498}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_28}, doi = {10.1007/978-3-642-13013-7\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BagherzandiJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Boyen10, author = {Xavier Boyen}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Lattice Mixing and Vanishing Trapdoors: {A} Framework for Fully Secure Short Signatures and More}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {499--517}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_29}, doi = {10.1007/978-3-642-13013-7\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Boyen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrzuskaFLS10, author = {Christina Brzuska and Marc Fischlin and Anja Lehmann and Dominique Schr{\"{o}}der}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Unlinkability of Sanitizable Signatures}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {444--461}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_26}, doi = {10.1007/978-3-642-13013-7\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrzuskaFLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CaoVZ10, author = {Zhenfu Cao and Ivan Visconti and Zongyang Zhang}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {193--208}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_12}, doi = {10.1007/978-3-642-13013-7\_12}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CaoVZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CostelloLN10, author = {Craig Costello and Tanja Lange and Michael Naehrig}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Faster Pairing Computations on Curves with High-Degree Twists}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {224--242}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_14}, doi = {10.1007/978-3-642-13013-7\_14}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CostelloLN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DentFMSS10, author = {Alexander W. Dent and Marc Fischlin and Mark Manulis and Martijn Stam and Dominique Schr{\"{o}}der}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Confidential Signatures and Deterministic Signcryption}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {462--479}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_27}, doi = {10.1007/978-3-642-13013-7\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DentFMSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FarashahiJ10, author = {Reza Rezaeian Farashahi and Marc Joye}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Efficient Arithmetic on Hessian Curves}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {243--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_15}, doi = {10.1007/978-3-642-13013-7\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FarashahiJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaugereMR10, author = {Jean{-}Charles Faug{\`{e}}re and Rapha{\"{e}}l Marinier and Gu{\'{e}}na{\"{e}}l Renault}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Implicit Factoring with Shared Most Significant and Middle Bits}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {70--87}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_5}, doi = {10.1007/978-3-642-13013-7\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaugereMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaugereS10, author = {Jean{-}Charles Faug{\`{e}}re and Pierre{-}Jean Spaenlehauer}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {35--52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_3}, doi = {10.1007/978-3-642-13013-7\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaugereS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FreemanGKRS10, author = {David Mandell Freeman and Oded Goldreich and Eike Kiltz and Alon Rosen and Gil Segev}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {More Constructions of Lossy and Correlation-Secure Trapdoor Functions}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {279--295}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_17}, doi = {10.1007/978-3-642-13013-7\_17}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FreemanGKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalbraithR10, author = {Steven D. Galbraith and Raminder S. Ruprai}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {368--383}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_22}, doi = {10.1007/978-3-642-13013-7\_22}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GalbraithR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GennaroHS10, author = {Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Text Search Protocols with Simulation Based Security}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {332--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_20}, doi = {10.1007/978-3-642-13013-7\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GennaroHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GennaroKKR10, author = {Rosario Gennaro and Jonathan Katz and Hugo Krawczyk and Tal Rabin}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Secure Network Coding over the Integers}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {142--160}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_9}, doi = {10.1007/978-3-642-13013-7\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GennaroKKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GhadafiSW10, author = {Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Groth-Sahai Proofs Revisited}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {177--192}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_11}, doi = {10.1007/978-3-642-13013-7\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GhadafiSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GrangerS10, author = {Robert Granger and Michael Scott}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {209--223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_13}, doi = {10.1007/978-3-642-13013-7\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GrangerS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GrothKL10, author = {Jens Groth and Aggelos Kiayias and Helger Lipmaa}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Multi-query Computationally-Private Information Retrieval with Constant Communication Rate}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {107--123}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_7}, doi = {10.1007/978-3-642-13013-7\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GrothKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HaralambievJKS10, author = {Kristiyan Haralambiev and Tibor Jager and Eike Kiltz and Victor Shoup}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_1}, doi = {10.1007/978-3-642-13013-7\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HaralambievJKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HayashiSWMST10, author = {Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Solving a 676-Bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6\emph{n}}}\))}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {351--367}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_21}, doi = {10.1007/978-3-642-13013-7\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HayashiSWMST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HazayN10, author = {Carmit Hazay and Kobbi Nissim}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Efficient Set Operations in the Presence of Malicious Adversaries}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {312--331}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_19}, doi = {10.1007/978-3-642-13013-7\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HazayN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HerranzLR10, author = {Javier Herranz and Fabien Laguillaumie and Carla R{\`{a}}fols}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Constant Size Ciphertexts in Threshold Attribute-Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {19--34}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_2}, doi = {10.1007/978-3-642-13013-7\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HerranzLR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HerrmannM10, author = {Mathias Herrmann and Alexander May}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {53--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_4}, doi = {10.1007/978-3-642-13013-7\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HerrmannM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuangMSWX10, author = {Xinyi Huang and Yi Mu and Willy Susilo and Wei Wu and Yang Xiang}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {124--141}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_8}, doi = {10.1007/978-3-642-13013-7\_8}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HuangMSWX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KawachiNTX10, author = {Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Security of Encryption Schemes in Weakened Random Oracle Models}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {403--419}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_24}, doi = {10.1007/978-3-642-13013-7\_24}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KawachiNTX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaurL10, author = {Sven Laur and Helger Lipmaa}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {On the Feasibility of Consistent Computations}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {88--106}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_6}, doi = {10.1007/978-3-642-13013-7\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaurL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MatsudaNT10, author = {Toshihide Matsuda and Ryo Nishimaki and Keisuke Tanaka}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {{CCA} Proxy Re-Encryption without Bilinear Maps in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {261--278}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_16}, doi = {10.1007/978-3-642-13013-7\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MatsudaNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MolY10, author = {Petros Mol and Scott Yilek}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {296--311}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_18}, doi = {10.1007/978-3-642-13013-7\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MolY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SmartV10, author = {Nigel P. Smart and Frederik Vercauteren}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {420--443}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_25}, doi = {10.1007/978-3-642-13013-7\_25}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SmartV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2010, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7}, doi = {10.1007/978-3-642-13013-7}, isbn = {978-3-642-13012-0}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP09, author = {Michel Abdalla and Xavier Boyen and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Distributed Public-Key Cryptography from Weak Secrets}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {139--159}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_9}, doi = {10.1007/978-3-642-00468-1\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbeKO09, author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Compact CCA-Secure Encryption for Messages of Arbitrary Length}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {377--392}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_21}, doi = {10.1007/978-3-642-00468-1\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbeKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AkiyamaGM09, author = {Koichiro Akiyama and Yasuhiro Goto and Hideyuki Miyake}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {An Algebraic Surface Cryptosystem}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {425--442}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_24}, doi = {10.1007/978-3-642-00468-1\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AkiyamaGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Aono09, author = {Yoshinori Aono}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {A New Lattice Construction for Partial Key Exposure Attack for {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {34--53}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_3}, doi = {10.1007/978-3-642-00468-1\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Aono09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BonehFKW09, author = {Dan Boneh and David Mandell Freeman and Jonathan Katz and Brent Waters}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Signing a Linear Subspace: Signature Schemes for Network Coding}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {68--87}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_5}, doi = {10.1007/978-3-642-00468-1\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BonehFKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrzuskaFFLPSSV09, author = {Christina Brzuska and Marc Fischlin and Tobias Freudenreich and Anja Lehmann and Marcus Page and Jakob Schelbert and Dominique Schr{\"{o}}der and Florian Volk}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Security of Sanitizable Signatures Revisited}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {317--336}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_18}, doi = {10.1007/978-3-642-00468-1\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrzuskaFFLPSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CamenischKRS09, author = {Jan Camenisch and Markulf Kohlweiss and Alfredo Rial and Caroline Sheedy}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {196--214}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_12}, doi = {10.1007/978-3-642-00468-1\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CamenischKRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CamenischKS09, author = {Jan Camenisch and Markulf Kohlweiss and Claudio Soriente}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {481--500}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_27}, doi = {10.1007/978-3-642-00468-1\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CamenischKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Chow09, author = {Sherman S. M. Chow}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Removing Escrow from Identity-Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {256--276}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_15}, doi = {10.1007/978-3-642-00468-1\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Chow09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoullGH09, author = {Scott E. Coull and Matthew Green and Susan Hohenberger}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {501--520}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_28}, doi = {10.1007/978-3-642-00468-1\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoullGH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardGKN09, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard and Jesper Buus Nielsen}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Asynchronous Multiparty Computation: Theory and Implementation}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {160--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_10}, doi = {10.1007/978-3-642-00468-1\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardGKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardM09, author = {Ivan Damg{\aa}rd and Gert L{\ae}ss{\o}e Mikkelsen}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {On the Theory and Practice of Personal Digital Signatures}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {277--296}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_16}, doi = {10.1007/978-3-642-00468-1\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FischlinS09, author = {Marc Fischlin and Dominique Schr{\"{o}}der}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Security of Blind Signatures under Aborts}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {297--316}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_17}, doi = {10.1007/978-3-642-00468-1\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FischlinS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GhodosiP09, author = {Hossein Ghodosi and Josef Pieprzyk}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Multi-Party Computation with Omnipresent Adversary}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {180--195}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_11}, doi = {10.1007/978-3-642-00468-1\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GhodosiP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GorantlaBN09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {105--123}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_7}, doi = {10.1007/978-3-642-00468-1\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GorantlaBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HerrmannL09, author = {Mathias Herrmann and Gregor Leander}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {A Practical Key Recovery Attack on Basic TCHo}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {411--424}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_23}, doi = {10.1007/978-3-642-00468-1\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HerrmannL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HooghSSV09, author = {Sebastiaan de Hoogh and Berry Schoenmakers and Boris Skoric and Jos{\'{e}} Villegas}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Verifiable Rotation of Homomorphic Encryptions}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {393--410}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_22}, doi = {10.1007/978-3-642-00468-1\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HooghSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JunodKL09, author = {Pascal Junod and Alexandre Karlov and Arjen K. Lenstra}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Improving the Boneh-Franklin Traitor Tracing Scheme}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {88--104}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_6}, doi = {10.1007/978-3-642-00468-1\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JunodKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KiayiasZ09, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Zero-Knowledge Proofs with Witness Elimination}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {124--138}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_8}, doi = {10.1007/978-3-642-00468-1\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KiayiasZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KimCH09, author = {Minkyu Kim and Jung Hee Cheon and Jin Hong}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Subset-Restricted Random Walks for Pollard rho Method on F\({}_{\mbox{p\({}^{\mbox{m}}\)}}\)}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {54--67}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_4}, doi = {10.1007/978-3-642-00468-1\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KimCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertV09, author = {Beno{\^{\i}}t Libert and Damien Vergnaud}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Towards Black-Box Accountable Authority {IBE} with Short Ciphertexts and Private Keys}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {235--255}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_14}, doi = {10.1007/978-3-642-00468-1\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LibertV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LongaG09, author = {Patrick Longa and Catherine H. Gebotys}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {443--462}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_25}, doi = {10.1007/978-3-642-00468-1\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LongaG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Matt09, author = {Brian J. Matt}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {337--356}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_19}, doi = {10.1007/978-3-642-00468-1\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Matt09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MayR09, author = {Alexander May and Maike Ritzenhofen}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {1--14}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_1}, doi = {10.1007/978-3-642-00468-1\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/MayR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MorilloR09, author = {Paz Morillo and Carla R{\`{a}}fols}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {The Security of All Bits Using List Decoding}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {15--33}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_2}, doi = {10.1007/978-3-642-00468-1\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MorilloR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NakanishiFHF09, author = {Toru Nakanishi and Hiroki Fujii and Yuta Hira and Nobuo Funabiki}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Revocable Group Signature Schemes with Constant Costs for Signing and Verifying}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {463--480}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_26}, doi = {10.1007/978-3-642-00468-1\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NakanishiFHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SeoKOS09, author = {Jae Hong Seo and Tetsutaro Kobayashi and Miyako Ohkubo and Koutarou Suzuki}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {215--234}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_13}, doi = {10.1007/978-3-642-00468-1\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SeoKOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShaoC09, author = {Jun Shao and Zhenfu Cao}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {CCA-Secure Proxy Re-encryption without Pairings}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {357--376}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_20}, doi = {10.1007/978-3-642-00468-1\_20}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShaoC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2009, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1}, doi = {10.1007/978-3-642-00468-1}, isbn = {978-3-642-00467-4}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BirkettD08, author = {James Birkett and Alexander W. Dent}, editor = {Ronald Cramer}, title = {Relations Among Notions of Plaintext Awareness}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {47--64}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_4}, doi = {10.1007/978-3-540-78440-1\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BirkettD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoRFG08, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro}, editor = {Ronald Cramer}, title = {Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {101--120}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_7}, doi = {10.1007/978-3-540-78440-1\_7}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoRFG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DentLP08, author = {Alexander W. Dent and Beno{\^{\i}}t Libert and Kenneth G. Paterson}, editor = {Ronald Cramer}, title = {Certificateless Encryption Schemes Strongly Secure in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {344--359}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_20}, doi = {10.1007/978-3-540-78440-1\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DentLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustKL08, author = {Sebastian Faust and Emilia K{\"{a}}sper and Stefan Lucks}, editor = {Ronald Cramer}, title = {Efficient Simultaneous Broadcast}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {180--196}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_11}, doi = {10.1007/978-3-540-78440-1\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaustKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FouqueMPS08, author = {Pierre{-}Alain Fouque and Gilles Macario{-}Rat and Ludovic Perret and Jacques Stern}, editor = {Ronald Cramer}, title = {Total Break of the \emph{l}-IC Signature Scheme}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {1--17}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_1}, doi = {10.1007/978-3-540-78440-1\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FouqueMPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalbraithV08, author = {Steven D. Galbraith and Eric R. Verheul}, editor = {Ronald Cramer}, title = {An Analysis of the Vector Decomposition Problem}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {308--327}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_18}, doi = {10.1007/978-3-540-78440-1\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GalbraithV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuangGKE08, author = {Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek A. El{-}Ghazawi}, editor = {Ronald Cramer}, title = {An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {214--228}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_13}, doi = {10.1007/978-3-540-78440-1\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuangGKE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KimC08, author = {Sungwook Kim and Jung Hee Cheon}, editor = {Ronald Cramer}, title = {A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {328--343}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_19}, doi = {10.1007/978-3-540-78440-1\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KimC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaurP08, author = {Sven Laur and Sylvain Pasini}, editor = {Ronald Cramer}, title = {SAS-Based Group Authentication and Key Agreement Protocols}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {197--213}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_12}, doi = {10.1007/978-3-540-78440-1\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaurP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LevieilN08, author = {{\'{E}}ric Levieil and David Naccache}, editor = {Ronald Cramer}, title = {Cryptographic Test Correction}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {85--100}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_6}, doi = {10.1007/978-3-540-78440-1\_6}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LevieilN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertV08, author = {Beno{\^{\i}}t Libert and Damien Vergnaud}, editor = {Ronald Cramer}, title = {Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {360--379}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_21}, doi = {10.1007/978-3-540-78440-1\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LibertV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiskovM08, author = {Moses D. Liskov and Silvio Micali}, editor = {Ronald Cramer}, title = {Online-Untransferable Signatures}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {248--267}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_15}, doi = {10.1007/978-3-540-78440-1\_15}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiskovM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuT08, author = {Yi{-}Ru Liu and Wen{-}Guey Tzeng}, editor = {Ronald Cramer}, title = {Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {380--396}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_22}, doi = {10.1007/978-3-540-78440-1\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LongaM08, author = {Patrick Longa and Ali Miri}, editor = {Ronald Cramer}, title = {New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {229--247}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_14}, doi = {10.1007/978-3-540-78440-1\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LongaM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Lyubashevsky08, author = {Vadim Lyubashevsky}, editor = {Ronald Cramer}, title = {Lattice-Based Identification Schemes Secure Under Active Attacks}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {162--179}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_10}, doi = {10.1007/978-3-540-78440-1\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Lyubashevsky08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MayR08, author = {Alexander May and Maike Ritzenhofen}, editor = {Ronald Cramer}, title = {Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {37--46}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_3}, doi = {10.1007/978-3-540-78440-1\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/MayR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MolY08, author = {Petros Mol and Moti Yung}, editor = {Ronald Cramer}, title = {Recovering {NTRU} Secret Key from Inversion Oracles}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {18--36}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_2}, doi = {10.1007/978-3-540-78440-1\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MolY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NumayamaIT08, author = {Akira Numayama and Toshiyuki Isshiki and Keisuke Tanaka}, editor = {Ronald Cramer}, title = {Security of Digital Signature Schemes in Weakened Random Oracle Models}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {268--287}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_16}, doi = {10.1007/978-3-540-78440-1\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NumayamaIT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PlantardSW08, author = {Thomas Plantard and Willy Susilo and Khin Than Win}, editor = {Ronald Cramer}, title = {A Digital Signature Scheme Based on CVP\({}_{\mbox{infinity}}\)}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {288--307}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_17}, doi = {10.1007/978-3-540-78440-1\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PlantardSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchuldtMP08, author = {Jacob C. N. Schuldt and Kanta Matsuura and Kenneth G. Paterson}, editor = {Ronald Cramer}, title = {Proxy Signatures Secure Against Proxy Key Exposure}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {141--161}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_9}, doi = {10.1007/978-3-540-78440-1\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchuldtMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShahandashtiS08, author = {Siamak Fayyaz Shahandashti and Reihaneh Safavi{-}Naini}, editor = {Ronald Cramer}, title = {Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {121--140}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_8}, doi = {10.1007/978-3-540-78440-1\_8}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShahandashtiS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/VentreV08, author = {Carmine Ventre and Ivan Visconti}, editor = {Ronald Cramer}, title = {Completely Non-malleable Encryption Revisited}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {65--84}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_5}, doi = {10.1007/978-3-540-78440-1\_5}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/VentreV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2008, editor = {Ronald Cramer}, title = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1}, doi = {10.1007/978-3-540-78440-1}, isbn = {978-3-540-78439-5}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaDMNPS07, author = {Michel Abdalla and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Duong Hieu Phan and Nigel P. Smart}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Identity-Based Traitor Tracing}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {361--376}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_24}, doi = {10.1007/978-3-540-71677-8\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaDMNPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellareS07, author = {Mihir Bellare and Sarah Shoup}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {201--216}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_14}, doi = {10.1007/978-3-540-71677-8\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellareS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoldyrevaFPW07, author = {Alexandra Boldyreva and Marc Fischlin and Adriana Palacio and Bogdan Warinschi}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {A Closer Look at {PKI:} Security and Efficiency}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {458--475}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_30}, doi = {10.1007/978-3-540-71677-8\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoldyrevaFPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoyenW07, author = {Xavier Boyen and Brent Waters}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {1--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_1}, doi = {10.1007/978-3-540-71677-8\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoyenW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BressonCG07, author = {Emmanuel Bresson and Dario Catalano and Rosario Gennaro}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Improved On-Line/Off-Line Threshold Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {217--232}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_15}, doi = {10.1007/978-3-540-71677-8\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BressonCG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BuldasL07, author = {Ahto Buldas and Sven Laur}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Knowledge-Binding Commitments with Applications in Time-Stamping}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {150--165}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_11}, doi = {10.1007/978-3-540-71677-8\_11}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BuldasL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CheonY07, author = {Jung Hee Cheon and Jeong Hyun Yi}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Fast Batch Verification of Multiple Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {442--457}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_29}, doi = {10.1007/978-3-540-71677-8\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CheonY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DingHNLW07, author = {Jintai Ding and Lei Hu and Xuyun Nie and Jianyu Li and John Wagner}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {High Order Linearization Equation {(HOLE)} Attack on Multivariate Public Key Cryptosystems}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {233--248}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_16}, doi = {10.1007/978-3-540-71677-8\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DingHNLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DingWY07, author = {Jintai Ding and Christopher Wolf and Bo{-}Yin Yang}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {\emph{l}-Invertible Cycles for \emph{M}ultivariate \emph{Q}uadratic (\emph{MQ}) Public Key Cryptography}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {266--281}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_18}, doi = {10.1007/978-3-540-71677-8\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DingWY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisLY07, author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Optimistic Fair Exchange in a Multi-user Setting}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {118--133}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_9}, doi = {10.1007/978-3-540-71677-8\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DuboisGS07, author = {Vivien Dubois and Louis Granboulan and Jacques Stern}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Cryptanalysis of {HFE} with Internal Perturbation}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {249--265}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_17}, doi = {10.1007/978-3-540-71677-8\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DuboisGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FarashahiSS07, author = {Reza Rezaeian Farashahi and Berry Schoenmakers and Andrey Sidorenko}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Efficient Pseudorandom Generators Based on the {DDH} Assumption}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {426--441}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_28}, doi = {10.1007/978-3-540-71677-8\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FarashahiSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Fischlin07, author = {Marc Fischlin}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Anonymous Signatures Made Easy}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {31--42}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_3}, doi = {10.1007/978-3-540-71677-8\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Fischlin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FujisakiS07, author = {Eiichiro Fujisaki and Koutarou Suzuki}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Traceable Ring Signature}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {181--200}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_13}, doi = {10.1007/978-3-540-71677-8\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FujisakiS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GamaN07, author = {Nicolas Gama and Phong Q. Nguyen}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {New Chosen-Ciphertext Attacks on {NTRU}}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {89--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_7}, doi = {10.1007/978-3-540-71677-8\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GamaN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GaraySV07, author = {Juan A. Garay and Berry Schoenmakers and Jos{\'{e}} Villegas}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Practical and Secure Solutions for Integer Comparison}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {330--342}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_22}, doi = {10.1007/978-3-540-71677-8\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GaraySV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GeT07, author = {He Ge and Stephen R. Tate}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {A Direct Anonymous Attestation Scheme for Embedded Devices}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {16--30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_2}, doi = {10.1007/978-3-540-71677-8\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GeT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GrothL07, author = {Jens Groth and Steve Lu}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Verifiable Shuffle of Large Size Ciphertexts}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {377--392}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_25}, doi = {10.1007/978-3-540-71677-8\_25}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GrothL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HanKY07, author = {Daewan Han and Myung{-}Hwan Kim and Yongjin Yeom}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from {PKC} 2003}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {107--117}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_8}, doi = {10.1007/978-3-540-71677-8\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HanKY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KawachiTX07, author = {Akinori Kawachi and Keisuke Tanaka and Keita Xagawa}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Multi-bit Cryptosystems Based on Lattice Problems}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {315--329}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_21}, doi = {10.1007/978-3-540-71677-8\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KawachiTX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kiltz07, author = {Eike Kiltz}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {282--297}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_19}, doi = {10.1007/978-3-540-71677-8\_19}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Kiltz07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KunihiroK07, author = {Noboru Kunihiro and Kaoru Kurosawa}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {412--425}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_27}, doi = {10.1007/978-3-540-71677-8\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KunihiroK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiK07, author = {Junzuo Lai and Weidong Kou}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Self-Generated-Certificate Public Key Encryption Without Pairing}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {476--489}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_31}, doi = {10.1007/978-3-540-71677-8\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertQY07, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Parallel Key-Insulated Public Key Encryption Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {298--314}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_20}, doi = {10.1007/978-3-540-71677-8\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertQY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MyasnikovU07, author = {Alex D. Myasnikov and Alexander Ushakov}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {76--88}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_6}, doi = {10.1007/978-3-540-71677-8\_6}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/MyasnikovU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NishideO07, author = {Takashi Nishide and Kazuo Ohta}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {343--360}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_23}, doi = {10.1007/978-3-540-71677-8\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NishideO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OstrovskyS07, author = {Rafail Ostrovsky and William E. Skeith III}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {A Survey of Single-Database Private Information Retrieval: Techniques and Applications}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {393--411}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_26}, doi = {10.1007/978-3-540-71677-8\_26}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/OstrovskyS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/RuinskiyST07, author = {Dima Ruinskiy and Adi Shamir and Boaz Tsaban}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {61--75}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_5}, doi = {10.1007/978-3-540-71677-8\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/RuinskiyST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShachamW07, author = {Hovav Shacham and Brent Waters}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Efficient Ring Signatures Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {166--180}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_12}, doi = {10.1007/978-3-540-71677-8\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShachamW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangBWB07, author = {Guilin Wang and Joonsang Baek and Duncan S. Wong and Feng Bao}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {43--60}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_4}, doi = {10.1007/978-3-540-71677-8\_4}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/WangBWB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhuSM07, author = {Huafei Zhu and Willy Susilo and Yi Mu}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {134--149}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_10}, doi = {10.1007/978-3-540-71677-8\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ZhuSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2007, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8}, doi = {10.1007/978-3-540-71677-8}, isbn = {978-3-540-71676-1}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP06, author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Password-Based Group Key Exchange in a Constant Number of Rounds}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {427--442}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_28}, doi = {10.1007/11745853\_28}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Bernstein06, author = {Daniel J. Bernstein}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Curve25519: New Diffie-Hellman Speed Records}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {207--228}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_14}, doi = {10.1007/11745853\_14}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Bernstein06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BjorstadD06, author = {Tor E. Bj{\o}rstad and Alexander W. Dent}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Building Better Signcryption Schemes with Tag-KEMs}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {491--507}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_32}, doi = {10.1007/11745853\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BjorstadD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BleichenbacherM06, author = {Daniel Bleichenbacher and Alexander May}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {New Attacks on {RSA} with Small Secret CRT-Exponents}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {1--13}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_1}, doi = {10.1007/11745853\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BleichenbacherM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BonehSW06, author = {Dan Boneh and Emily Shen and Brent Waters}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Strongly Unforgeable Signatures Based on Computational Diffie-Hellman}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {229--240}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_15}, doi = {10.1007/11745853\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BonehSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChatterjeeS06, author = {Sanjit Chatterjee and Palash Sarkar}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Generalization of the Selective-ID Security Model for {HIBE} Protocols}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {241--256}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_16}, doi = {10.1007/11745853\_16}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChatterjeeS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Chevallier-MamesPP06, author = {Beno{\^{\i}}t Chevallier{-}Mames and Pascal Paillier and David Pointcheval}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Encoding-Free ElGamal Encryption Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {91--104}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_7}, doi = {10.1007/11745853\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Chevallier-MamesPP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChevassutFGP06, author = {Olivier Chevassut and Pierre{-}Alain Fouque and Pierrick Gaudry and David Pointcheval}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {The Twist-AUgmented Technique for Key Exchange}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {410--426}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_27}, doi = {10.1007/11745853\_27}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ChevassutFGP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChowBN06, author = {Sherman S. M. Chow and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Security-Mediated Certificateless Cryptography}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {508--524}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_33}, doi = {10.1007/11745853\_33}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ChowBN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChuT06, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Conditional Oblivious Cast}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {443--457}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_29}, doi = {10.1007/11745853\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChuT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CommeineS06, author = {An Commeine and Igor A. Semaev}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {174--190}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_12}, doi = {10.1007/11745853\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CommeineS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CrutchfieldMTW06, author = {Chris Crutchfield and David Molnar and David Turner and David A. Wagner}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Generic On-Line/Off-Line Threshold Signatures}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {58--74}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_5}, doi = {10.1007/11745853\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CrutchfieldMTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardT06, author = {Ivan Damg{\aa}rd and Rune Thorbek}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Linear Integer Secret Sharing and Distributed Exponentiation}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {75--90}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_6}, doi = {10.1007/11745853\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DingG06, author = {Jintai Ding and Jason E. Gower}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Inoculating Multivariate Schemes Against Differential Attacks}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {290--301}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_19}, doi = {10.1007/11745853\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DingG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DocheIK06, author = {Christophe Doche and Thomas Icart and David R. Kohel}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Efficient Scalar Multiplication by Isogeny Decompositions}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {191--206}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_13}, doi = {10.1007/11745853\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DocheIK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GentryR06, author = {Craig Gentry and Zulfikar Ramzan}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Identity-Based Aggregate Signatures}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {257--273}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_17}, doi = {10.1007/11745853\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GentryR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HanaokaHI06, author = {Goichiro Hanaoka and Yumiko Hanaoka and Hideki Imai}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Parallel Key-Insulated Public Key Encryption}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {105--122}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_8}, doi = {10.1007/11745853\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HanaokaHI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kiltz06, author = {Eike Kiltz}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {On the Limitations of the Spread of an IBE-to-PKE Transformation}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {274--289}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_18}, doi = {10.1007/11745853\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Kiltz06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kunz-JacquesMPS06, author = {S{\'{e}}bastien Kunz{-}Jacques and Gwena{\"{e}}lle Martinet and Guillaume Poupard and Jacques Stern}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {27--43}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_3}, doi = {10.1007/11745853\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Kunz-JacquesMPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaH06, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {The Power of Identification Schemes}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {364--377}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_24}, doi = {10.1007/11745853\_24}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaS06, author = {Kaoru Kurosawa and Katja Schmidt{-}Samoa}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {New Online/Offline Signature Schemes Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {330--346}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_22}, doi = {10.1007/11745853\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LauterM06, author = {Kristin E. Lauter and Anton Mityagin}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Security Analysis of {KEA} Authenticated Key Exchange Protocol}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {378--394}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_25}, doi = {10.1007/11745853\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LauterM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertQ06, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {On Constructing Certificateless Cryptosystems from Identity Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {474--490}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_31}, doi = {10.1007/11745853\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LysyanskayaM06, author = {Anna Lysyanskaya and Mira Meyerovich}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Provably Secure Steganography with Imperfect Sampling}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {123--139}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_9}, doi = {10.1007/11745853\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LysyanskayaM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Mironov06, author = {Ilya Mironov}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Collision-Resistant No More: Hash-and-Sign Paradigm Revisited}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {140--156}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_10}, doi = {10.1007/11745853\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Mironov06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MohasselF06, author = {Payman Mohassel and Matthew K. Franklin}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Efficient Polynomial Operations in the Shared-Coefficients Setting}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {44--57}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_4}, doi = {10.1007/11745853\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MohasselF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MohasselF06a, author = {Payman Mohassel and Matthew K. Franklin}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Efficiency Tradeoffs for Malicious Two-Party Computation}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {458--473}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_30}, doi = {10.1007/11745853\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MohasselF06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MullerV06, author = {Fr{\'{e}}d{\'{e}}ric Muller and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {High-Order Attacks Against the Exponent Splitting Protection}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {315--329}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_21}, doi = {10.1007/11745853\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MullerV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MyasnikovSU06, author = {Alexei G. Myasnikov and Vladimir Shpilrain and Alexander Ushakov}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {302--314}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_20}, doi = {10.1007/11745853\_20}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/MyasnikovSU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PasiniV06, author = {Sylvain Pasini and Serge Vaudenay}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {SAS-Based Authenticated Key Agreement}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {395--409}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_26}, doi = {10.1007/11745853\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PasiniV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SteinfeldPW06, author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {157--173}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_11}, doi = {10.1007/11745853\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SteinfeldPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TeranishiS06, author = {Isamu Teranishi and Kazue Sako}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {\emph{k}-Times Anonymous Authentication with a Constant Proving Cost}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {525--542}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_34}, doi = {10.1007/11745853\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TeranishiS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Wieschebrink06, author = {Christian Wieschebrink}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {An Attack on a Modified Niederreiter Encryption Scheme}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {14--26}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_2}, doi = {10.1007/11745853\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Wieschebrink06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YangWDW06, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Anonymous Signature Schemes}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {347--363}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_23}, doi = {10.1007/11745853\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YangWDW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2006, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853}, doi = {10.1007/11745853}, isbn = {3-540-33851-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaCP05, author = {Michel Abdalla and Olivier Chevassut and David Pointcheval}, editor = {Serge Vaudenay}, title = {One-Time Verifier-Based Encrypted Key Exchange}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {47--64}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_5}, doi = {10.1007/978-3-540-30580-4\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaCP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaFP05, author = {Michel Abdalla and Pierre{-}Alain Fouque and David Pointcheval}, editor = {Serge Vaudenay}, title = {Password-Based Authenticated Key Exchange in the Three-Party Setting}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {65--84}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_6}, doi = {10.1007/978-3-540-30580-4\_6}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaFP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Al-RiyamiP05, author = {Sattam S. Al{-}Riyami and Kenneth G. Paterson}, editor = {Serge Vaudenay}, title = {{CBE} from {CL-PKE:} {A} Generic Construction and Efficient Schemes}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {398--415}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_27}, doi = {10.1007/978-3-540-30580-4\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Al-RiyamiP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaekSS05, author = {Joonsang Baek and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Serge Vaudenay}, title = {Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {380--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_26}, doi = {10.1007/978-3-540-30580-4\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BaekSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BangerterCM05, author = {Endre Bangerter and Jan Camenisch and Ueli M. Maurer}, editor = {Serge Vaudenay}, title = {Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {154--171}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_11}, doi = {10.1007/978-3-540-30580-4\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BangerterCM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Bleichenbacher05, author = {Daniel Bleichenbacher}, editor = {Serge Vaudenay}, title = {Breaking a Cryptographic Protocol with Pseudoprimes}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {9--15}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_2}, doi = {10.1007/978-3-540-30580-4\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Bleichenbacher05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoG05, author = {Dario Catalano and Rosario Gennaro}, editor = {Serge Vaudenay}, title = {Cramer-Damg{\aa}rd Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {313--327}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_22}, doi = {10.1007/978-3-540-30580-4\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CathaloCN05, author = {Julien Cathalo and Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {Serge Vaudenay}, title = {From Fixed-Length to Arbitrary-Length {RSA} Encoding Schemes Revisited}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {234--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_16}, doi = {10.1007/978-3-540-30580-4\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CathaloCN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChenM05, author = {Liqun Chen and John Malone{-}Lee}, editor = {Serge Vaudenay}, title = {Improved Identity-Based Signcryption}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {362--379}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_25}, doi = {10.1007/978-3-540-30580-4\_25}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChenM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChuT05, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Serge Vaudenay}, title = {Efficient \emph{k}-Out-of-\emph{n} Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {172--183}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_12}, doi = {10.1007/978-3-540-30580-4\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardD05, author = {Ivan Damg{\aa}rd and Kasper Dupont}, editor = {Serge Vaudenay}, title = {Efficient Threshold {RSA} Signatures with General Moduli and No Extra Assumptions}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {346--361}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_24}, doi = {10.1007/978-3-540-30580-4\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DingS05, author = {Jintai Ding and Dieter Schmidt}, editor = {Serge Vaudenay}, title = {Cryptanalysis of HFEv and Internal Perturbation of {HFE}}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {288--301}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_20}, doi = {10.1007/978-3-540-30580-4\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DingS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisY05, author = {Yevgeniy Dodis and Aleksandr Yampolskiy}, editor = {Serge Vaudenay}, title = {A Verifiable Random Function with Short Proofs and Keys}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {416--431}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_28}, doi = {10.1007/978-3-540-30580-4\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Gjosteen05, author = {Kristian Gj{\o}steen}, editor = {Serge Vaudenay}, title = {Symmetric Subgroup Membership Problems}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {104--119}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_8}, doi = {10.1007/978-3-540-30580-4\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Gjosteen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Granboulan05, author = {Louis Granboulan}, editor = {Serge Vaudenay}, title = {A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {302--312}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_21}, doi = {10.1007/978-3-540-30580-4\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Granboulan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HayashiT05, author = {Ryotaro Hayashi and Keisuke Tanaka}, editor = {Serge Vaudenay}, title = {The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {216--233}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_15}, doi = {10.1007/978-3-540-30580-4\_15}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HayashiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JonssonR05, author = {Jakob Jonsson and Matthew J. B. Robshaw}, editor = {Serge Vaudenay}, title = {Securing {RSA-KEM} via the {AES}}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {29--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_4}, doi = {10.1007/978-3-540-30580-4\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JonssonR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JouxKMR05, author = {Antoine Joux and S{\'{e}}bastien Kunz{-}Jacques and Fr{\'{e}}d{\'{e}}ric Muller and Pierre{-}Michel Ricordel}, editor = {Serge Vaudenay}, title = {Cryptanalysis of the Tractable Rational Map Cryptosystem}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {258--274}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_18}, doi = {10.1007/978-3-540-30580-4\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JouxKMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NaccacheNTW05, author = {David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan}, editor = {Serge Vaudenay}, title = {Experimenting with Faults, Lattices and the {DSA}}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {16--28}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_3}, doi = {10.1007/978-3-540-30580-4\_3}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/NaccacheNTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OgataKH05, author = {Wakaha Ogata and Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Serge Vaudenay}, title = {The Security of the {FDH} Variant of Chaum's Undeniable Signature Scheme}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {328--345}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_23}, doi = {10.1007/978-3-540-30580-4\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OgataKH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OngK05, author = {Emil Ong and John Kubiatowicz}, editor = {Serge Vaudenay}, title = {Optimizing Robustness While Generating Shared Secret Safe Primes}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {120--137}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_9}, doi = {10.1007/978-3-540-30580-4\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OngK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Schindler05, author = {Werner Schindler}, editor = {Serge Vaudenay}, title = {On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {85--103}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_7}, doi = {10.1007/978-3-540-30580-4\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Schindler05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SteinfeldCWP05, author = {Ron Steinfeld and Scott Contini and Huaxiong Wang and Josef Pieprzyk}, editor = {Serge Vaudenay}, title = {Converse Results to the Wiener Attack on {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {184--198}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_13}, doi = {10.1007/978-3-540-30580-4\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/SteinfeldCWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SunY05, author = {Hung{-}Min Sun and Cheng{-}Ta Yang}, editor = {Serge Vaudenay}, title = {{RSA} with Balanced Short Exponents and Its Application to Entity Authentication}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {199--215}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_14}, doi = {10.1007/978-3-540-30580-4\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SunY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangHLCY05, author = {Lih{-}Chung Wang and Yuh{-}Hua Hu and Feipei Lai and Chun{-}yen Chou and Bo{-}Yin Yang}, editor = {Serge Vaudenay}, title = {Tractable Rational Map Signature}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {244--257}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_17}, doi = {10.1007/978-3-540-30580-4\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangHLCY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WolfP05, author = {Christopher Wolf and Bart Preneel}, editor = {Serge Vaudenay}, title = {Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {275--287}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_19}, doi = {10.1007/978-3-540-30580-4\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WolfP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YacobiY05, author = {Oded Yacobi and Yacov Yacobi}, editor = {Serge Vaudenay}, title = {A New Related Message Attack on {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {1--8}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_1}, doi = {10.1007/978-3-540-30580-4\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YacobiY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YangGL05, author = {Wu{-}Chuan Yang and Dah{-}Jyh Guan and Chi{-}Sung Laih}, editor = {Serge Vaudenay}, title = {Fast Multi-computations with Integer Similarity Strategy}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {138--153}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_10}, doi = {10.1007/978-3-540-30580-4\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YangGL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2005, editor = {Serge Vaudenay}, title = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b105124}, doi = {10.1007/B105124}, isbn = {3-540-24454-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AkishitaT04, author = {Toru Akishita and Tsuyoshi Takagi}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {346--359}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_25}, doi = {10.1007/978-3-540-24632-9\_25}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AkishitaT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AmbainisJL04, author = {Andris Ambainis and Markus Jakobsson and Helger Lipmaa}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Cryptographic Randomized Response Techniques}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {425--438}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_31}, doi = {10.1007/978-3-540-24632-9\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AmbainisJL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AvanziCS04, author = {Roberto Maria Avanzi and Mathieu Ciet and Francesco Sica}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {28--40}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_3}, doi = {10.1007/978-3-540-24632-9\_3}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AvanziCS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaekZ04, author = {Joonsang Baek and Yuliang Zheng}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Identity-Based Threshold Decryption}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {262--276}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_19}, doi = {10.1007/978-3-540-24632-9\_19}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BaekZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BenjumeaLMT04, author = {Vicente Benjumea and Javier L{\'{o}}pez and Jos{\'{e}} A. Montenegro and Jos{\'{e}} M. Troya}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {A First Approach to Provide Anonymity in Attribute Certificates}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {402--415}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_29}, doi = {10.1007/978-3-540-24632-9\_29}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BenjumeaLMT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BlomerM04, author = {Johannes Bl{\"{o}}mer and Alexander May}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {A Generalized Wiener Attack on {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {1--13}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_1}, doi = {10.1007/978-3-540-24632-9\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BlomerM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BressonC04, author = {Emmanuel Bresson and Dario Catalano}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Constant Round Authenticated Group Key Agreement via Distributed Computation}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {115--129}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_9}, doi = {10.1007/978-3-540-24632-9\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BressonC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BressonCP04, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {New Security Results on Encrypted Key Exchange}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {145--158}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_11}, doi = {10.1007/978-3-540-24632-9\_11}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BressonCP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChoiHL04, author = {Kyu Young Choi and Jung Yeon Hwang and Dong Hoon Lee}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Efficient ID-based Group Key Agreement with Bilinear Maps}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {130--144}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_10}, doi = {10.1007/978-3-540-24632-9\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChoiHL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Coron04, author = {Jean{-}S{\'{e}}bastien Coron}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {14--27}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_2}, doi = {10.1007/978-3-540-24632-9\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Coron04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Courtois04, author = {Nicolas T. Courtois}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Algebraic Attacks over GF(2\({}^{\mbox{k}}\)), Application to {HFE} Challenge 2 and Sflash-v2}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {201--217}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_15}, doi = {10.1007/978-3-540-24632-9\_15}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Courtois04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Ding04, author = {Jintai Ding}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {305--318}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_22}, doi = {10.1007/978-3-540-24632-9\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Ding04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ElwaillyGR04, author = {Farid F. Elwailly and Craig Gentry and Zulfikar Ramzan}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {QuasiModo: Efficient Certificate Validation and Revocation}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {375--388}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_27}, doi = {10.1007/978-3-540-24632-9\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ElwaillyGR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FlonO04, author = {St{\'{e}}phane Flon and Roger Oyono}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Fast Arithmetic on Jacobians of Picard Curves}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {55--68}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_5}, doi = {10.1007/978-3-540-24632-9\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FlonO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Furukawa04, author = {Jun Furukawa}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {319--332}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_23}, doi = {10.1007/978-3-540-24632-9\_23}, timestamp = {Sat, 30 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Furukawa04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HayashiOT04, author = {Ryotaro Hayashi and Tatsuaki Okamoto and Keisuke Tanaka}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {An {RSA} Family of Trap-Door Permutations with a Common Domain and Its Applications}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {291--304}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_21}, doi = {10.1007/978-3-540-24632-9\_21}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HayashiOT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/King04, author = {Brian King}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {A Point Compression Method for Elliptic Curves Defined over {GF(2} n)}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {333--345}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_24}, doi = {10.1007/978-3-540-24632-9\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/King04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KogaS04, author = {Satoshi Koga and Kouichi Sakurai}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {A Distributed Online Certificate Status Protocol with a Single Public Key}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {389--401}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_28}, doi = {10.1007/978-3-540-24632-9\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KogaS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KoshibaK04, author = {Takeshi Koshiba and Kaoru Kurosawa}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Short Exponent Diffie-Hellman Problems}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {173--186}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_13}, doi = {10.1007/978-3-540-24632-9\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KoshibaK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaH04, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {From Digital Signature to ID-based Identification/Signature}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {248--261}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_18}, doi = {10.1007/978-3-540-24632-9\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertQ04, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {187--200}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_14}, doi = {10.1007/978-3-540-24632-9\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/May04, author = {Alexander May}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Secret Exponent Attacks on RSA-type Schemes with Moduli N= p\({}^{\mbox{r}}\)q}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {218--230}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_16}, doi = {10.1007/978-3-540-24632-9\_16}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/May04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MishraS04, author = {Pradeep Kumar Mishra and Palash Sarkar}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {41--54}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_4}, doi = {10.1007/978-3-540-24632-9\_4}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MishraS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MonneratV04, author = {Jean Monnerat and Serge Vaudenay}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Undeniable Signatures Based on Characters: How to Sign with One Bit}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {69--85}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_6}, doi = {10.1007/978-3-540-24632-9\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MonneratV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PengBDV04, author = {Kun Peng and Colin Boyd and Ed Dawson and Kapalee Viswanathan}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {A Correct, Private, and Efficient Mix Network}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {439--454}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_32}, doi = {10.1007/978-3-540-24632-9\_32}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PengBDV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Safavi-NainiMY04, author = {Reihaneh Safavi{-}Naini and Luke McAven and Moti Yung}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures"}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {231--247}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_17}, doi = {10.1007/978-3-540-24632-9\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Safavi-NainiMY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShparlinskiW04, author = {Igor E. Shparlinski and Arne Winterhof}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {A Nonuniform Algorithm for the Hidden Number Problem in Subgroups}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {416--424}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_30}, doi = {10.1007/978-3-540-24632-9\_30}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShparlinskiW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SteinfeldWP04, author = {Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {86--100}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_7}, doi = {10.1007/978-3-540-24632-9\_7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/SteinfeldWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/VascoNS04, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Mats N{\"{a}}slund and Igor E. Shparlinski}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {New Results on the Hardness of Diffie-Hellman Bits}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {159--172}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_12}, doi = {10.1007/978-3-540-24632-9\_12}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/VascoNS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhangHSI04, author = {Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {360--374}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_26}, doi = {10.1007/978-3-540-24632-9\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ZhangHSI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhangSS04, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {An Efficient Signature Scheme from Bilinear Pairings and Its Applications}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {277--290}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_20}, doi = {10.1007/978-3-540-24632-9\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ZhangSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Zhu04, author = {Huafei Zhu}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {101--114}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_8}, doi = {10.1007/978-3-540-24632-9\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Zhu04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2004, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95631}, doi = {10.1007/B95631}, isbn = {3-540-21018-0}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AkkarCDG03, author = {Mehdi{-}Laurent Akkar and Nicolas T. Courtois and Romain Duteuil and Louis Goubin}, editor = {Yvo Desmedt}, title = {A Fast and Secure Implementation of Sflash}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {267--278}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_20}, doi = {10.1007/3-540-36288-6\_20}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AkkarCDG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AntipaBMSV03, author = {Adrian Antipa and Daniel R. L. Brown and Alfred Menezes and Ren{\'{e}} Struik and Scott A. Vanstone}, editor = {Yvo Desmedt}, title = {Validation of Elliptic Curve Public Keys}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {211--223}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_16}, doi = {10.1007/3-540-36288-6\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AntipaBMSV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellareBS03, author = {Mihir Bellare and Alexandra Boldyreva and Jessica Staddon}, editor = {Yvo Desmedt}, title = {Randomness Re-use in Multi-recipient Encryption Schemeas}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {85--99}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_7}, doi = {10.1007/3-540-36288-6\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellareBS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Boldyreva03, author = {Alexandra Boldyreva}, editor = {Yvo Desmedt}, title = {Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {31--46}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_3}, doi = {10.1007/3-540-36288-6\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Boldyreva03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoydN03, author = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Yvo Desmedt}, title = {Round-Optimal Contributory Conference Key Agreement}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {161--174}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_12}, doi = {10.1007/3-540-36288-6\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoydN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChaC03, author = {Jae Choon Cha and Jung Hee Cheon}, editor = {Yvo Desmedt}, title = {An Identity-Based Signature from Gap Diffie-Hellman Groups}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {18--30}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_2}, doi = {10.1007/3-540-36288-6\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChaC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Courtois03, author = {Nicolas T. Courtois}, editor = {Yvo Desmedt}, title = {Generic Attacks and the Security of Quartz}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {351--364}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_26}, doi = {10.1007/3-540-36288-6\_26}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Courtois03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CourtoisDF03, author = {Nicolas T. Courtois and Magnus Daum and Patrick Felke}, editor = {Yvo Desmedt}, title = {On the Security of HFE, HFEv- and Quartz}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {337--350}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_25}, doi = {10.1007/3-540-36288-6\_25}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CourtoisDF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dodis03, author = {Yevgeniy Dodis}, editor = {Yvo Desmedt}, title = {Efficient Construction of (Distributed) Verifiable Random Functions}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {1--17}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_1}, doi = {10.1007/3-540-36288-6\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dodis03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisF03, author = {Yevgeniy Dodis and Nelly Fazio}, editor = {Yvo Desmedt}, title = {Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {100--115}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_8}, doi = {10.1007/3-540-36288-6\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisKXY03, author = {Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung}, editor = {Yvo Desmedt}, title = {Strong Key-Insulated Signature Schemes}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {130--144}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_10}, doi = {10.1007/3-540-36288-6\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisKXY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Fischlin03, author = {Marc Fischlin}, editor = {Yvo Desmedt}, title = {The Cramer-Shoup Strong-RSASignature Scheme Revisited}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {116--129}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_9}, doi = {10.1007/3-540-36288-6\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Fischlin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge Luis Villar}, editor = {Yvo Desmedt}, title = {A Practical Public Key Cryptosystem from Paillier and Rabin Schemes}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {279--291}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_21}, doi = {10.1007/3-540-36288-6\_21}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GeiselmannS03, author = {Willi Geiselmann and Rainer Steinwandt}, editor = {Yvo Desmedt}, title = {A Dedicated Sieving Hardware}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {254--266}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_19}, doi = {10.1007/3-540-36288-6\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GeiselmannS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Goubin03, author = {Louis Goubin}, editor = {Yvo Desmedt}, title = {A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {199--210}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_15}, doi = {10.1007/3-540-36288-6\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Goubin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Groth03, author = {Jens Groth}, editor = {Yvo Desmedt}, title = {A Verifiable Secret Shuffle of Homomorphic Encryptions}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {145--160}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_11}, doi = {10.1007/3-540-36288-6\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Groth03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HofheinzS03, author = {Dennis Hofheinz and Rainer Steinwandt}, editor = {Yvo Desmedt}, title = {A Practical Attack on Some Braid Group Based Cryptographic Primitives}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {187--198}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_14}, doi = {10.1007/3-540-36288-6\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HofheinzS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IzuT03, author = {Tetsuya Izu and Tsuyoshi Takagi}, editor = {Yvo Desmedt}, title = {Exceptional Procedure Attack on Elliptic Curve Cryptosystems}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {224--239}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_17}, doi = {10.1007/3-540-36288-6\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IzuT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kuhn03, author = {Ulrich K{\"{u}}hn}, editor = {Yvo Desmedt}, title = {Side-Channel Attacks on Textbook {RSA} and ElGamal Encryption}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {324--336}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_24}, doi = {10.1007/3-540-36288-6\_24}, timestamp = {Mon, 05 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Kuhn03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MacKenzie03, author = {Philip D. MacKenzie}, editor = {Yvo Desmedt}, title = {An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {47--61}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_4}, doi = {10.1007/3-540-36288-6\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MacKenzie03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NaslundSW03, author = {Mats N{\"{a}}slund and Igor E. Shparlinski and William Whyte}, editor = {Yvo Desmedt}, title = {On the Bit Security of NTRUEncrypt}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {62--70}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_5}, doi = {10.1007/3-540-36288-6\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NaslundSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PaengJH03, author = {Seong{-}Hun Paeng and Bae Eun Jung and Kil{-}Chan Ha}, editor = {Yvo Desmedt}, title = {A Lattice Based Public Key Cryptosystem Using Polynomial Representations}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {292--308}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_22}, doi = {10.1007/3-540-36288-6\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PaengJH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Stam03, author = {Martijn Stam}, editor = {Yvo Desmedt}, title = {On Montgomery-Like Representationsfor Elliptic Curves over GF(2\({}^{\mbox{k}}\))}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {240--253}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_18}, doi = {10.1007/3-540-36288-6\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Stam03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Tobias03, author = {Christian Tobias}, editor = {Yvo Desmedt}, title = {Security Analysis of the {MOR} Cryptosystem}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {175--186}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_13}, doi = {10.1007/3-540-36288-6\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Tobias03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Vaudenay03, author = {Serge Vaudenay}, editor = {Yvo Desmedt}, title = {The Security of {DSA} and {ECDSA}}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {309--323}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_23}, doi = {10.1007/3-540-36288-6\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Vaudenay03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WatanabeSI03, author = {Yodai Watanabe and Junji Shikata and Hideki Imai}, editor = {Yvo Desmedt}, title = {Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {71--84}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_6}, doi = {10.1007/3-540-36288-6\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WatanabeSI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbeS02, author = {Masayuki Abe and Koutarou Suzuki}, editor = {David Naccache and Pascal Paillier}, title = {M+1-st Price Auction Using Homomorphic Encryption}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {115--124}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_8}, doi = {10.1007/3-540-45664-3\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbeS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaekSZ02, author = {Joonsang Baek and Ron Steinfeld and Yuliang Zheng}, editor = {David Naccache and Pascal Paillier}, title = {Formal Proofs for the Security of Signcryption}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {80--98}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_6}, doi = {10.1007/3-540-45664-3\_6}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BaekSZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrierJ02, author = {Eric Brier and Marc Joye}, editor = {David Naccache and Pascal Paillier}, title = {Weierstra{\ss} Elliptic Curves and Side-Channel Attacks}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {335--345}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_24}, doi = {10.1007/3-540-45664-3\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrierJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, editor = {David Naccache and Pascal Paillier}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {17--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_2}, doi = {10.1007/3-540-45664-3\_2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CourtoisGMT02, author = {Nicolas T. Courtois and Louis Goubin and Willi Meier and Jean{-}Daniel Tacier}, editor = {David Naccache and Pascal Paillier}, title = {Solving Underdefined Systems of Multivariate Quadratic Equations}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {211--227}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_15}, doi = {10.1007/3-540-45664-3\_15}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CourtoisGMT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardJ02, author = {Ivan Damg{\aa}rd and Mads Jurik}, editor = {David Naccache and Pascal Paillier}, title = {Client/Server Tradeoffs for Online Elections}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {125--140}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_9}, doi = {10.1007/3-540-45664-3\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HanaokaSZI02, author = {Goichiro Hanaoka and Junji Shikata and Yuliang Zheng and Hideki Imai}, editor = {David Naccache and Pascal Paillier}, title = {Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {64--79}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_5}, doi = {10.1007/3-540-45664-3\_5}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HanaokaSZI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IzuT02, author = {Tetsuya Izu and Tsuyoshi Takagi}, editor = {David Naccache and Pascal Paillier}, title = {A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {280--296}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_20}, doi = {10.1007/3-540-45664-3\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IzuT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JoyeY02, author = {Marc Joye and Sung{-}Ming Yen}, editor = {David Naccache and Pascal Paillier}, title = {One-Way Cross-Trees and Their Applications}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {346--356}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_25}, doi = {10.1007/3-540-45664-3\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JoyeY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JoyeY02a, author = {Marc Joye and Sung{-}Ming Yen}, editor = {David Naccache and Pascal Paillier}, title = {New Minimal Modified Radix-r Representation with Applications to Smart Cards}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {375--384}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_27}, doi = {10.1007/3-540-45664-3\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JoyeY02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JuelsG02, author = {Ari Juels and Jorge Guajardo}, editor = {David Naccache and Pascal Paillier}, title = {{RSA} Key Generation with Verifiable Randomness}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {357--374}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_26}, doi = {10.1007/3-540-45664-3\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JuelsG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KiayiasY02, author = {Aggelos Kiayias and Moti Yung}, editor = {David Naccache and Pascal Paillier}, title = {Self-tallying Elections and Perfect Ballot Secrecy}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {141--158}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_10}, doi = {10.1007/3-540-45664-3\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KiayiasY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KobaraI02, author = {Kazukuni Kobara and Hideki Imai}, editor = {David Naccache and Pascal Paillier}, title = {New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece {PKC} Proposed at Asiacrypt 2000}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {237--251}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_17}, doi = {10.1007/3-540-45664-3\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KobaraI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Koshiba02, author = {Takeshi Koshiba}, editor = {David Naccache and Pascal Paillier}, title = {On Sufficient Randomness for Secure Public-Key Cryptosystems}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {34--47}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_3}, doi = {10.1007/3-540-45664-3\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Koshiba02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kurosawa02, author = {Kaoru Kurosawa}, editor = {David Naccache and Pascal Paillier}, title = {Multi-recipient Public-Key Encryption with Shortened Ciphertext}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {48--63}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_4}, doi = {10.1007/3-540-45664-3\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Kurosawa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaY02, author = {Kaoru Kurosawa and Takuya Yoshida}, editor = {David Naccache and Pascal Paillier}, title = {Linear Code Implies Public-Key Traitor Tracing}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {172--187}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_12}, doi = {10.1007/3-540-45664-3\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LeeDZ02, author = {Chan H. Lee and Xiaotie Deng and Huafei Zhu}, editor = {David Naccache and Pascal Paillier}, title = {Design and Security Analysis of Anonymous Group Identification Protocols}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {188--198}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_13}, doi = {10.1007/3-540-45664-3\_13}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LeeDZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LenstraS02, author = {Arjen K. Lenstra and Igor E. Shparlinski}, editor = {David Naccache and Pascal Paillier}, title = {Selective Forgery of {RSA} Signatures with Fixed-Pattern Padding}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {228--236}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_16}, doi = {10.1007/3-540-45664-3\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LenstraS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MaitlandB02, author = {Greg Maitland and Colin Boyd}, editor = {David Naccache and Pascal Paillier}, title = {A Provably Secure Restrictive Partially Blind Signature Scheme}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {99--114}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_7}, doi = {10.1007/3-540-45664-3\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MaitlandB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Novak02, author = {Roman Novak}, editor = {David Naccache and Pascal Paillier}, title = {SPA-Based Adaptive Chosen-Ciphertext Attack on {RSA} Implementation}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {252--262}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_18}, doi = {10.1007/3-540-45664-3\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Novak02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ParkJKL02, author = {Young{-}Ho Park and Sangtae Jeong and Chang Han Kim and Jongin Lim}, editor = {David Naccache and Pascal Paillier}, title = {An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {323--334}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_23}, doi = {10.1007/3-540-45664-3\_23}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ParkJKL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ParkOLLS02, author = {Young{-}Ho Park and Sangho Oh and Sangjin Lee and Jongin Lim and Maenghee Sung}, editor = {David Naccache and Pascal Paillier}, title = {An Improved Method of Multiplication on Certain Elliptic Curves}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {310--322}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_22}, doi = {10.1007/3-540-45664-3\_22}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ParkOLLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Preneel02, author = {Bart Preneel}, editor = {David Naccache and Pascal Paillier}, title = {New European Schemes for Signature, Integrity and Encryption {(NESSIE):} {A} Status Report}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {297--309}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_21}, doi = {10.1007/3-540-45664-3\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Preneel02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/QuisquaterPV02, author = {Micha{\"{e}}l Quisquater and Bart Preneel and Joos Vandewalle}, editor = {David Naccache and Pascal Paillier}, title = {On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {199--210}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_14}, doi = {10.1007/3-540-45664-3\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/QuisquaterPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SakuraiT02, author = {Kouichi Sakurai and Tsuyoshi Takagi}, editor = {David Naccache and Pascal Paillier}, title = {New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {1--16}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_1}, doi = {10.1007/3-540-45664-3\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SakuraiT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Schindler02, author = {Werner Schindler}, editor = {David Naccache and Pascal Paillier}, title = {A Combined Timing and Power Attack}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {263--279}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_19}, doi = {10.1007/3-540-45664-3\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Schindler02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Tzeng02, author = {Wen{-}Guey Tzeng}, editor = {David Naccache and Pascal Paillier}, title = {Efficient 1-Out-n Oblivious Transfer Schemes}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {159--171}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_11}, doi = {10.1007/3-540-45664-3\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Tzeng02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2002, editor = {David Naccache and Pascal Paillier}, title = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3}, doi = {10.1007/3-540-45664-3}, isbn = {3-540-43168-3}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2003, editor = {Yvo Desmedt}, title = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36288-6}, doi = {10.1007/3-540-36288-6}, isbn = {3-540-00324-X}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbeH01, author = {Masayuki Abe and Fumitaka Hoshino}, editor = {Kwangjo Kim}, title = {Remarks on Mix-Network Based on Permutation Networks}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {317--324}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_23}, doi = {10.1007/3-540-44586-2\_23}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbeH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AnsperBRW01, author = {Arne Ansper and Ahto Buldas and Meelis Roos and Jan Willemson}, editor = {Kwangjo Kim}, title = {Efficient Long-Term Validation of Digital Signatures}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {402--415}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_29}, doi = {10.1007/3-540-44586-2\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AnsperBRW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaoDGSSW01, author = {Feng Bao and Robert H. Deng and Willi Geiselmann and Claus{-}Peter Schnorr and Rainer Steinwandt and Hongjun Wu}, editor = {Kwangjo Kim}, title = {Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {153--164}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_11}, doi = {10.1007/3-540-44586-2\_11}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BaoDGSSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BressonS01, author = {Emmanuel Bresson and Jacques Stern}, editor = {Kwangjo Kim}, title = {Efficient Revocation in Group Signatures}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {190--206}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_15}, doi = {10.1007/3-540-44586-2\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BressonS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardJ01, author = {Ivan Damg{\aa}rd and Mads Jurik}, editor = {Kwangjo Kim}, title = {A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {119--136}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_9}, doi = {10.1007/3-540-44586-2\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DesmedtBS01, author = {Yvo Desmedt and Mike Burmester and Jennifer Seberry}, editor = {Kwangjo Kim}, title = {Equitability in Retroactive Data Confiscation versus Proactive Key Escrow}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {277--286}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_20}, doi = {10.1007/3-540-44586-2\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DesmedtBS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FouqueS01, author = {Pierre{-}Alain Fouque and Jacques Stern}, editor = {Kwangjo Kim}, title = {One Round Threshold Discrete-Log Key Generation without Private Channels}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {300--316}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_22}, doi = {10.1007/3-540-44586-2\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FouqueS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FrankelMY01, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, editor = {Kwangjo Kim}, title = {Adaptive Security for the Additive-Sharing Based Proactive {RSA}}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {240--263}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_18}, doi = {10.1007/3-540-44586-2\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FrankelMY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GeiselmannL01, author = {Willi Geiselmann and Harald Lukhaub}, editor = {Kwangjo Kim}, title = {Redundant Representation of Finite Fields}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {339--352}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_25}, doi = {10.1007/3-540-44586-2\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GeiselmannL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GuajardoBKP01, author = {Jorge Guajardo and Rainer Bl{\"{u}}mel and Uwe Krieger and Christof Paar}, editor = {Kwangjo Kim}, title = {Efficient Implementation of Elliptic Curve Cryptosystems on the {TI} {MSP} 430x33x Family of Microcontrollers}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {365--382}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_27}, doi = {10.1007/3-540-44586-2\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GuajardoBKP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JakobssonW01, author = {Markus Jakobsson and Susanne Wetzel}, editor = {Kwangjo Kim}, title = {Secure Server-Aided Signature Generation}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {383--401}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_28}, doi = {10.1007/3-540-44586-2\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JakobssonW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JaulmesJ01, author = {{\'{E}}liane Jaulmes and Antoine Joux}, editor = {Kwangjo Kim}, title = {Cryptanalysis of {PKP:} {A} New Approach}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {165--172}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_12}, doi = {10.1007/3-540-44586-2\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JaulmesJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JoyeT01, author = {Marc Joye and Christophe Tymen}, editor = {Kwangjo Kim}, title = {Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {353--364}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_26}, doi = {10.1007/3-540-44586-2\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JoyeT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KimL01, author = {Chong Hee Kim and Pil Joong Lee}, editor = {Kwangjo Kim}, title = {New Key Recovery in {WAKE} Protocol}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {325--338}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_24}, doi = {10.1007/3-540-44586-2\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KimL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KobaraI01, author = {Kazukuni Kobara and Hideki Imai}, editor = {Kwangjo Kim}, title = {Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece {PKC}}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {19--35}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_2}, doi = {10.1007/3-540-44586-2\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KobaraI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KomakiWHI01, author = {Hirotaka Komaki and Yuji Watanabe and Goichiro Hanaoka and Hideki Imai}, editor = {Kwangjo Kim}, title = {Efficient Asymmetric Self-Enforcement Scheme with Public Traceability}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {225--239}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_17}, doi = {10.1007/3-540-44586-2\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KomakiWHI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Koshiba01, author = {Takeshi Koshiba}, editor = {Kwangjo Kim}, title = {A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {87--103}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_7}, doi = {10.1007/3-540-44586-2\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Koshiba01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KuglerV01, author = {Dennis K{\"{u}}gler and Holger Vogt}, editor = {Kwangjo Kim}, title = {Marking: {A} Privacy Protecting Approach Against Blackmailing}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {137--152}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_10}, doi = {10.1007/3-540-44586-2\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KuglerV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaOMM01, author = {Kaoru Kurosawa and Wakaha Ogata and Toshihiko Matsuo and Shuichi Makishima}, editor = {Kwangjo Kim}, title = {{IND-CCA} Public Key Schemes Equivalent to Factoring n=pq}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {36--47}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_3}, doi = {10.1007/3-540-44586-2\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaOMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LenstraS01, author = {Arjen K. Lenstra and Igor E. Shparlinski}, editor = {Kwangjo Kim}, title = {On the Security of Lenstra's Variant of {DSA} without Long Inversions}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {64--72}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_5}, doi = {10.1007/3-540-44586-2\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LenstraS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LenstraV01, author = {Arjen K. Lenstra and Eric R. Verheul}, editor = {Kwangjo Kim}, title = {Fast Irreducibility and Subgroup Membership Testing in {XTR}}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {73--86}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_6}, doi = {10.1007/3-540-44586-2\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LenstraV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MoshopoulosP01, author = {Nikos K. Moshopoulos and Kiamal Z. Pekmestzi}, editor = {Kwangjo Kim}, title = {A Novel Systolic Architecture for Efficient {RSA} Implementation}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {416--421}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_30}, doi = {10.1007/3-540-44586-2\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MoshopoulosP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Muller01, author = {Siguna M{\"{u}}ller}, editor = {Kwangjo Kim}, title = {On the Security of Williams Based Public Key Encryption Scheme}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {1--18}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_1}, doi = {10.1007/3-540-44586-2\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Muller01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OkamotoP01, author = {Tatsuaki Okamoto and David Pointcheval}, editor = {Kwangjo Kim}, title = {The Gap-Problems: {A} New Class of Problems for the Security of Cryptographic Schemes}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {104--118}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_8}, doi = {10.1007/3-540-44586-2\_8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/OkamotoP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Steinwandt01, author = {Rainer Steinwandt}, editor = {Kwangjo Kim}, title = {Loopholes in Two Public Key Cryptosystems Using the Modular Group}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {180--189}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_14}, doi = {10.1007/3-540-44586-2\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Steinwandt01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TzengT01, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Kwangjo Kim}, title = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {207--224}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_16}, doi = {10.1007/3-540-44586-2\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TzengT01a, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Kwangjo Kim}, title = {Robust Forward-Secure Signature Schemes with Proactive Security}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {264--276}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_19}, doi = {10.1007/3-540-44586-2\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TzengT01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WuBD01, author = {Hongjun Wu and Feng Bao and Robert H. Deng}, editor = {Kwangjo Kim}, title = {Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {173--179}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_13}, doi = {10.1007/3-540-44586-2\_13}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/WuBD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Young01, author = {Adam L. Young and Moti Yung}, editor = {Kwangjo Kim}, title = {A {PVSS} as Hard as Discrete Log and Shareholder Separability}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {287--299}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_21}, doi = {10.1007/3-540-44586-2\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Young01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Zheng01, author = {Yuliang Zheng}, editor = {Kwangjo Kim}, title = {Identification, Signature and Signcryption Using High Order Residues Modulo an {RSA} Composite}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {48--63}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_4}, doi = {10.1007/3-540-44586-2\_4}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Zheng01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2001, editor = {Kwangjo Kim}, title = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2}, doi = {10.1007/3-540-44586-2}, isbn = {3-540-41658-7}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Arita00, author = {Seigo Arita}, editor = {Hideki Imai and Yuliang Zheng}, title = {Gaudry's Variant against C\({}_{\mbox{ab}}\) Curves}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {58--67}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_5}, doi = {10.1007/978-3-540-46588-1\_5}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Arita00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BanksLS00, author = {William D. Banks and Daniel Lieman and Igor E. Shparlinski}, editor = {Hideki Imai and Yuliang Zheng}, title = {An Identification Scheme Based on Sparse Polynomials}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {68--74}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_6}, doi = {10.1007/978-3-540-46588-1\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BanksLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BohannonJS00, author = {Philip Bohannon and Markus Jakobsson and Sukamol Srikwan}, editor = {Hideki Imai and Yuliang Zheng}, title = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {373--390}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_25}, doi = {10.1007/978-3-540-46588-1\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BohannonJS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrickellPVY00, author = {Ernest F. Brickell and David Pointcheval and Serge Vaudenay and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Design Validations for Discrete Logarithm Based Signature Schemes}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {276--292}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_19}, doi = {10.1007/978-3-540-46588-1\_19}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrickellPVY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BuldasLS00, author = {Ahto Buldas and Helger Lipmaa and Berry Schoenmakers}, editor = {Hideki Imai and Yuliang Zheng}, title = {Optimally Efficient Accountable Time-Stamping}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {293--305}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_20}, doi = {10.1007/978-3-540-46588-1\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BuldasLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00, author = {Mike Burmester and Yvo Desmedt and Hiroshi Doi and Masahiro Mambo and Eiji Okamoto and Mitsuru Tada and Yuko Yoshifuji}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Structured ElGamal-Type Multisignature Scheme}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {466--483}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_31}, doi = {10.1007/978-3-540-46588-1\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CramerDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Philip D. MacKenzie}, editor = {Hideki Imai and Yuliang Zheng}, title = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {354--373}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_24}, doi = {10.1007/978-3-540-46588-1\_24}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CramerDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FrankelMY00, author = {Yair Frankel and Philip D. MacKenzie and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {"Psyeudorandom Intermixing": {A} Tool for Shared Cryptography}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {306--325}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_21}, doi = {10.1007/978-3-540-46588-1\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FrankelMY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GasskoGM00, author = {Irene Gassko and Peter Gemmell and Philip D. MacKenzie}, editor = {Hideki Imai and Yuliang Zheng}, title = {Efficient and Fresh Cerification}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {342--353}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_23}, doi = {10.1007/978-3-540-46588-1\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GasskoGM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuhnleinM00, author = {Detlef H{\"{u}}hnlein and Johannes Merkle}, editor = {Hideki Imai and Yuliang Zheng}, title = {An Efficient NICE-Schnorr-Type Signature Scheme}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {14--27}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_2}, doi = {10.1007/978-3-540-46588-1\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuhnleinM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/InoueS00, author = {Toro Inoue and Kouichi Sakurai}, editor = {Hideki Imai and Yuliang Zheng}, title = {Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {391--404}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_26}, doi = {10.1007/978-3-540-46588-1\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/InoueS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IzuKY00, author = {Tetsuya Izu and Jun Kogure and Kazuhiro Yokoyama}, editor = {Hideki Imai and Yuliang Zheng}, title = {Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {210--222}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_15}, doi = {10.1007/978-3-540-46588-1\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IzuKY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KohlasM00, author = {Reto Kohlas and Ueli M. Maurer}, editor = {Hideki Imai and Yuliang Zheng}, title = {Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {93--112}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_8}, doi = {10.1007/978-3-540-46588-1\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KohlasM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LenstraV00, author = {Arjen K. Lenstra and Eric R. Verheul}, editor = {Hideki Imai and Yuliang Zheng}, title = {Selecting Cryptographic Key Sizes}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {446--465}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_30}, doi = {10.1007/978-3-540-46588-1\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LenstraV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LimH00, author = {Chae Hoon Lim and Hyo Sun Hwang}, editor = {Hideki Imai and Yuliang Zheng}, title = {Fast Implementation of Elliptic Curve Arithmetic in GF(p\({}^{\mbox{n}}\))}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {405--421}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_27}, doi = {10.1007/978-3-540-46588-1\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LimH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiuOHC00, author = {Chuchang Liu and Maris A. Ozols and Marie Henderson and Anthony Cant}, editor = {Hideki Imai and Yuliang Zheng}, title = {A State-Based Model for Certificate Management Systems}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {75--92}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_7}, doi = {10.1007/978-3-540-46588-1\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiuOHC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OkeyaS00, author = {Katsuyuki Okeya and Hiroyuki Kurumatani and Kouichi Sakurai}, editor = {Hideki Imai and Yuliang Zheng}, title = {Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {238--257}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_17}, doi = {10.1007/978-3-540-46588-1\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OkeyaS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ParkBD00, author = {Juanma Gonz{\'{a}}lez Nieto and DongGook Park and Colin Boyd and Ed Dawson}, editor = {Hideki Imai and Yuliang Zheng}, title = {Key Recovery in Third Generation Wireless Communication Systems}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {223--237}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_16}, doi = {10.1007/978-3-540-46588-1\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ParkBD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ParkBM00, author = {DongGook Park and Colin Boyd and Sang{-}Jae Moon}, editor = {Hideki Imai and Yuliang Zheng}, title = {Forward Secrecy and Its Application to Future Mobile Communications Security}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {433--445}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_29}, doi = {10.1007/978-3-540-46588-1\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ParkBM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PastuszakMS00, author = {Jaroslaw Pastuszak and Dariusz Michatek and Josef Pieprzyk and Jennifer Seberry}, editor = {Hideki Imai and Yuliang Zheng}, title = {Identification of Bad Signatures in Batches}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {28--45}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_3}, doi = {10.1007/978-3-540-46588-1\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/PastuszakMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Pointcheval00, author = {David Pointcheval}, editor = {Hideki Imai and Yuliang Zheng}, title = {The Composite Discrete Logarithm and Secure Authentication}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {113--128}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_9}, doi = {10.1007/978-3-540-46588-1\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Pointcheval00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Pointcheval00a, author = {David Pointcheval}, editor = {Hideki Imai and Yuliang Zheng}, title = {Chosen-Ciphertext Security for Any One-Way Cryptosystem}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {129--146}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_10}, doi = {10.1007/978-3-540-46588-1\_10}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Pointcheval00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PoupardS00, author = {Guillaume Poupard and Jacques Stern}, editor = {Hideki Imai and Yuliang Zheng}, title = {Short Proofs of Knowledge for Factoring}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {147--166}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_11}, doi = {10.1007/978-3-540-46588-1\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PoupardS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Sako00, author = {Kazue Sako}, editor = {Hideki Imai and Yuliang Zheng}, title = {An Auction Protocol Which Hides Bids of Losers}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {422--432}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_28}, doi = {10.1007/978-3-540-46588-1\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Sako00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShinSR00, author = {Sang{-}Uk Shin and Weon Shin and Kyung Hyune Rhee}, editor = {Hideki Imai and Yuliang Zheng}, title = {All-or-Nothing Transform and Remotely Keyed Encription Protocols}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {178--195}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_13}, doi = {10.1007/978-3-540-46588-1\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShinSR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Tzeng00, author = {Wen{-}Guey Tzeng}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {1--13}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_1}, doi = {10.1007/978-3-540-46588-1\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Tzeng00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Verheul00, author = {Eric R. Verheul}, editor = {Hideki Imai and Yuliang Zheng}, title = {Certificates of Recoverability with Scale Recovery Agent Security}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {258--275}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_18}, doi = {10.1007/978-3-540-46588-1\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Verheul00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WangHCTCC00, author = {Xiaoyun Wang and Lucas Chi Kwong Hui and Kam{-}Pui Chow and Wai Wan Tsang and C. F. Chong and H. W. Chan}, editor = {Hideki Imai and Yuliang Zheng}, title = {Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {167--177}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_12}, doi = {10.1007/978-3-540-46588-1\_12}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WangHCTCC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WenSM00, author = {Wu Wen and Takamichi Saito and Fumio Mizoguchi}, editor = {Hideki Imai and Yuliang Zheng}, title = {Security of Public Key Certificate Based Authentication Protocols}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {196--209}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_14}, doi = {10.1007/978-3-540-46588-1\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WenSM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YoungY00, author = {Adam L. Young and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {RSA-Based Auto-recoverable Cryptosystems}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {326--341}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_22}, doi = {10.1007/978-3-540-46588-1\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YoungY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhouDB00, author = {Jianying Zhou and Robert H. Deng and Feng Bao}, editor = {Hideki Imai and Yuliang Zheng}, title = {Some Remarks on a Fair Exchange Protocol}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {46--57}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_4}, doi = {10.1007/978-3-540-46588-1\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ZhouDB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2000, editor = {Hideki Imai and Yuliang Zheng}, title = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/b75033}, doi = {10.1007/B75033}, isbn = {3-540-66967-1}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaoD99, author = {Feng Bao and Robert H. Deng}, editor = {Hideki Imai and Yuliang Zheng}, title = {A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {1--11}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_1}, doi = {10.1007/3-540-49162-7\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BaoD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Blake-WilsonM99, author = {Simon Blake{-}Wilson and Alfred Menezes}, editor = {Hideki Imai and Yuliang Zheng}, title = {Unknown Key-Share Attacks on the Station-to-Station {(STS)} Protocol}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {154--170}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_12}, doi = {10.1007/3-540-49162-7\_12}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Blake-WilsonM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Coron99, author = {Jean{-}S{\'{e}}bastien Coron}, editor = {Hideki Imai and Yuliang Zheng}, title = {On the Security of Random Sources}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {29--42}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_3}, doi = {10.1007/3-540-49162-7\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Coron99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronN99, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {Hideki Imai and Yuliang Zheng}, title = {On the Security of {RSA} Screening}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {197--203}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_15}, doi = {10.1007/3-540-49162-7\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoronN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoupeNS99, author = {Christophe Coup{\'{e}} and Phong Q. Nguyen and Jacques Stern}, editor = {Hideki Imai and Yuliang Zheng}, title = {The Effectiveness of Lattice Attacks Against Low-Exponent {RSA}}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {204--218}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_16}, doi = {10.1007/3-540-49162-7\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoupeNS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Ferrer99, author = {Josep Domingo{-}Ferrer}, editor = {Hideki Imai and Yuliang Zheng}, title = {Anonymous Fingerprinting Based on Committed Oblivious Transfer}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {43--52}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_4}, doi = {10.1007/3-540-49162-7\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Ferrer99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FujisakiO99, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, editor = {Hideki Imai and Yuliang Zheng}, title = {How to Enhance the Security of Public-Key Encryption at Minimum Cost}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {53--68}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_5}, doi = {10.1007/3-540-49162-7\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FujisakiO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GamageLZ99, author = {Chandana Gamage and Jussipekka Leiwo and Yuliang Zheng}, editor = {Hideki Imai and Yuliang Zheng}, title = {Encrypted Message Authentication by Firewalls}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {69--81}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_6}, doi = {10.1007/3-540-49162-7\_6}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GamageLZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HadaT99, author = {Satoshi Hada and Toshiaki Tanaka}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Relationship between One-Wayness and Correlation Intractability}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {82--96}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_7}, doi = {10.1007/3-540-49162-7\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HadaT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HandschuhTY99, author = {Helena Handschuh and Yiannis Tsiounis and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Decision Oracles are Equivalent to Matching Oracles}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {276--289}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_22}, doi = {10.1007/3-540-49162-7\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HandschuhTY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Jakobsson99, author = {Markus Jakobsson}, editor = {Hideki Imai and Yuliang Zheng}, title = {On Quorum Controlled Asymmetric Proxy Re-encryption}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {112--121}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_9}, doi = {10.1007/3-540-49162-7\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Jakobsson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Jakobsson99a, author = {Markus Jakobsson}, editor = {Hideki Imai and Yuliang Zheng}, title = {Mini-Cash: {A} Minimalistic Approach to E-Commerce}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {122--135}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_10}, doi = {10.1007/3-540-49162-7\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Jakobsson99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LeL99, author = {Chang{-}Hyi Le and Jong In Lim}, editor = {Hideki Imai and Yuliang Zheng}, title = {A New Aspect of Dual Basis for Efficient Field Arithmetic}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {12--28}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_2}, doi = {10.1007/3-540-49162-7\_2}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LeL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LeeK99, author = {Hyung{-}Woo Lee and Tai{-}Yun Kim}, editor = {Hideki Imai and Yuliang Zheng}, title = {Message Recovery Fair Blind Signature}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {97--111}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_8}, doi = {10.1007/3-540-49162-7\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LeeK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MiyazakiKS99, author = {Shingo Miyazaki and Ikuko Kuroda and Kouichi Sakurai}, editor = {Hideki Imai and Yuliang Zheng}, title = {Toward Fair International Key Escrow}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {171--187}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_13}, doi = {10.1007/3-540-49162-7\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MiyazakiKS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NaccacheSS99, author = {David Naccache and Adi Shamir and Julien P. Stern}, editor = {Hideki Imai and Yuliang Zheng}, title = {How to Copyright a Function?}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {188--196}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_14}, doi = {10.1007/3-540-49162-7\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NaccacheSS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NikanderKP99, author = {Pekka Nikander and Yki Kortesniemi and Jonna Partanen}, editor = {Hideki Imai and Yuliang Zheng}, title = {Preserving Privacy in Distributed Delegation with Fast Certificates}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {136--153}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_11}, doi = {10.1007/3-540-49162-7\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NikanderKP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Paillier99, author = {Pascal Paillier}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Trapdoor Permutation Equivalent to Factoring}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {219--222}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_17}, doi = {10.1007/3-540-49162-7\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Paillier99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Paillier99a, author = {Pascal Paillier}, editor = {Hideki Imai and Yuliang Zheng}, title = {Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {223--234}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_18}, doi = {10.1007/3-540-49162-7\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Paillier99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Paillier99b, author = {Pascal Paillier}, editor = {Hideki Imai and Yuliang Zheng}, title = {Evaluating Differential Fault Analysis of Unknown Cryptosystems}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {235--244}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_19}, doi = {10.1007/3-540-49162-7\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Paillier99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/RubiaCM99, author = {Montse Rubia and Juan Carlos Cruellas and Manuel Medina}, editor = {Hideki Imai and Yuliang Zheng}, title = {Removing Interoperability Barriers Between the {X.509} and {EDIFACT} Public Key Infrastructures: The {DEDICA} Project}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {245--262}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_20}, doi = {10.1007/3-540-49162-7\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/RubiaCM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShinRY99, author = {Sang{-}Uk Shin and Kyung Hyune Rhee and Jae Woo Yoon}, editor = {Hideki Imai and Yuliang Zheng}, title = {Hash Functions and the {MAC} Using All-or-Nothing Property}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {263--275}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_21}, doi = {10.1007/3-540-49162-7\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShinRY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WatanabeI99, author = {Yuji Watanabe and Hideki Imai}, editor = {Hideki Imai and Yuliang Zheng}, title = {Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {290--305}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_23}, doi = {10.1007/3-540-49162-7\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WatanabeI99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YoungY99, author = {Adam L. Young and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {306--314}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_24}, doi = {10.1007/3-540-49162-7\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YoungY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhouL99, author = {Jianying Zhou and Kwok{-}Yan Lam}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Secure Pay-per View Scheme for Web-Based Video Service}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {315--326}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_25}, doi = {10.1007/3-540-49162-7\_25}, timestamp = {Sun, 07 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ZhouL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/1999, editor = {Hideki Imai and Yuliang Zheng}, title = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7}, doi = {10.1007/3-540-49162-7}, isbn = {3-540-65644-8}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ArakiSM98, author = {Kiyomichi Araki and Takakazu Satoh and Shinji Miura}, editor = {Hideki Imai and Yuliang Zheng}, title = {Overview of Elliptic Curve Cryptography}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {29--49}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054012}, doi = {10.1007/BFB0054012}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ArakiSM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BaoD98, author = {Feng Bao and Robert H. Deng}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Signcryption Scheme with Signature Directly Verifiable by Public Key}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {55--59}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054014}, doi = {10.1007/BFB0054014}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BaoD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChangLHL98, author = {Chin{-}Chen Chang and Jyh{-}Jong Leu and Pai{-}Cheng Huang and Wei{-}Bin Lee}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Scheme for Obtaining a Message from the Digital Multisignature}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {154--163}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054022}, doi = {10.1007/BFB0054022}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ChangLHL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CheonPPK98, author = {Jung Hee Cheon and Sung{-}Mo Park and Sangwoo Park and Daeho Kim}, editor = {Hideki Imai and Yuliang Zheng}, title = {Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {195--202}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054025}, doi = {10.1007/BFB0054025}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CheonPPK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DavidS98, author = {Michael W. David and Kouichi Sakurai}, editor = {Hideki Imai and Yuliang Zheng}, title = {Security Issues for Contactless Smart Cards}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {247--252}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054029}, doi = {10.1007/BFB0054029}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DavidS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FrankelY98, author = {Yair Frankel and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Distributed Public Key Cryptosystems}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {1--13}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054010}, doi = {10.1007/BFB0054010}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FrankelY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HasegawaNM98, author = {Toshio Hasegawa and Junko Nakajima and Mitsuru Matsui}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {182--194}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054024}, doi = {10.1007/BFB0054024}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HasegawaNM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HiroseY98, author = {Shoichi Hirose and Susumu Yoshida}, editor = {Hideki Imai and Yuliang Zheng}, title = {An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {135--148}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054020}, doi = {10.1007/BFB0054020}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HiroseY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IzuKNY98, author = {Tetsuya Izu and Jun Kogure and Masayuki Noro and Kazuhiro Yokoyama}, editor = {Hideki Imai and Yuliang Zheng}, title = {Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {253--257}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054030}, doi = {10.1007/BFB0054030}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IzuKNY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LehtiN98, author = {Ilari Lehti and Pekka Nikander}, editor = {Hideki Imai and Yuliang Zheng}, title = {Certifying Trust}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {83--98}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054017}, doi = {10.1007/BFB0054017}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LehtiN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MamboS98, author = {Masahiro Mambo and Hiroki Shizuya}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {258--262}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054031}, doi = {10.1007/BFB0054031}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MamboS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Mao98, author = {Wenbo Mao}, editor = {Hideki Imai and Yuliang Zheng}, title = {Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {60--71}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054015}, doi = {10.1007/BFB0054015}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Mao98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MerkleW98, author = {Johannes Merkle and Ralph Werchner}, editor = {Hideki Imai and Yuliang Zheng}, title = {On the Security of Server-Aided {RSA} Protocols}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {99--116}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054018}, doi = {10.1007/BFB0054018}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MerkleW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MihaljevicZI98, author = {Miodrag J. Mihaljevic and Yuliang Zheng and Hideki Imai}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {217--233}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054027}, doi = {10.1007/BFB0054027}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/MihaljevicZI98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Misarsky98, author = {Jean{-}Fran{\c{c}}ois Misarsky}, editor = {Hideki Imai and Yuliang Zheng}, title = {How (not) to Design {RSA} Signature Schemes}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {14--28}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054011}, doi = {10.1007/BFB0054011}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Misarsky98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Okamoto98, author = {Tatsuaki Okamoto and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Lower Bounds on Term-Based Divisible Cash Systems}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {72--82}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054016}, doi = {10.1007/BFB0054016}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Okamoto98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SaeedniaS98, author = {Shahrokh Saeednia and Reihaneh Safavi{-}Naini}, editor = {Hideki Imai and Yuliang Zheng}, title = {On the Security of Girault's Identification Scheme}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {149--153}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054021}, doi = {10.1007/BFB0054021}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SaeedniaS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SakaiSI98, author = {Yasuyuki Sakai and Kouichi Sakurai and Hirokazu Ishizuka}, editor = {Hideki Imai and Yuliang Zheng}, title = {Secure Hyperelliptic Cryptosystems and Their Performances}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {164--181}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054023}, doi = {10.1007/BFB0054023}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SakaiSI98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShinRRL98, author = {Sang{-}Uk Shin and Kyung Hyune Rhee and DaeHyun Ryu and Sangjin Lee}, editor = {Hideki Imai and Yuliang Zheng}, title = {A New Hash Function Based on MDx-Family and Its Application to {MAC}}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {234--246}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054028}, doi = {10.1007/BFB0054028}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShinRRL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Stern98, author = {Jacques Stern}, editor = {Hideki Imai and Yuliang Zheng}, title = {Lattices and Cryptography: An Overview}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {50--54}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054013}, doi = {10.1007/BFB0054013}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Stern98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TsiounisY98, author = {Yiannis Tsiounis and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {On the Security of ElGamal Based Encryption}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {117--134}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054019}, doi = {10.1007/BFB0054019}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TsiounisY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Yamamura98, author = {Akihiro Yamamura}, editor = {Hideki Imai and Yuliang Zheng}, title = {Public-Key Cryptosystems Using the Modular Group}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {203--216}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054026}, doi = {10.1007/BFB0054026}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Yamamura98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/1998, editor = {Hideki Imai and Yuliang Zheng}, title = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054009}, doi = {10.1007/BFB0054009}, isbn = {3-540-64693-0}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.