default search action
Search dblp for Publications
export results for "toc:db/conf/cisc/inscrypt2013.bht:"
@proceedings{DBLP:conf/cisc/2013, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12087-4}, doi = {10.1007/978-3-319-12087-4}, isbn = {978-3-319-12086-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CaoLM13, author = {Zhengjun Cao and Fr{\'{e}}d{\'{e}}ric Lafitte and Olivier Markowitch}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger {OT} Scheme}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {282--288}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_18}, doi = {10.1007/978-3-319-12087-4\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CaoLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CarletTTL13, author = {Claude Carlet and Deng Tang and Xiaohu Tang and Qunying Liao}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {New Construction of Differentially 4-Uniform Bijections}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {22--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_2}, doi = {10.1007/978-3-319-12087-4\_2}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CarletTTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenLYS13, author = {Kai Chen and Dongdai Lin and Li Yan and Xin Sun}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Environment-Bound {SAML} Assertions: {A} Fresh Approach to Enhance the Security of {SAML} Assertions}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {361--376}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_23}, doi = {10.1007/978-3-319-12087-4\_23}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenLYS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenWLW13, author = {Shan Chen and Kunpeng Wang and Dongdai Lin and Tao Wang}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Omega Pairing on Hyperelliptic Curves}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {167--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_11}, doi = {10.1007/978-3-319-12087-4\_11}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenWLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChiuHCDYC13, author = {Yi{-}Hao Chiu and Wei{-}Chih Hong and Li{-}Ping Chou and Jintai Ding and Bo{-}Yin Yang and Chen{-}Mou Cheng}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {A Practical Attack on Patched {MIFARE} Classic}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {150--164}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_10}, doi = {10.1007/978-3-319-12087-4\_10}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChiuHCDYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DurnogaDKZ13, author = {Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michal Zajac}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {One-Time Programs with Limited Memory}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {377--394}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_24}, doi = {10.1007/978-3-319-12087-4\_24}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/DurnogaDKZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GongZFY13, author = {Xinxin Gong and Bin Zhang and Dengguo Feng and Tongjiang Yan}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z{\_}pq}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {86--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_6}, doi = {10.1007/978-3-319-12087-4\_6}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GongZFY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HajraM13, author = {Suvadeep Hajra and Debdeep Mukhopadhyay}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Multivariate Leakage Model for Improving Non-profiling {DPA} on Noisy Power Traces}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {325--342}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_21}, doi = {10.1007/978-3-319-12087-4\_21}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HajraM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuX13, author = {Zhi Hu and Maozhi Xu}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {The Gallant-Lambert-Vanstone Decomposition Revisited}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {201--216}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_13}, doi = {10.1007/978-3-319-12087-4\_13}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/JiaLLL13, author = {Dingding Jia and Bao Li and Xianhui Lu and Yamin Liu}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {{RSA-OAEP} is {RKA} Secure}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {270--281}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_17}, doi = {10.1007/978-3-319-12087-4\_17}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/JiaLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KubiakK13, author = {Przemyslaw Kubiak and Miroslaw Kutylowski}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Supervised Usage of Signature Creation Devices}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {132--149}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_9}, doi = {10.1007/978-3-319-12087-4\_9}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KubiakK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiWLS13, author = {Xiaoqian Li and Peng Wang and Bao Li and Zhelei Sun}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {395--406}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_25}, doi = {10.1007/978-3-319-12087-4\_25}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiWLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiWZ13, author = {Liangze Li and Hongfeng Wu and Fan Zhang}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Pairing Computation on Edwards Curves with High-Degree Twists}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {185--200}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_12}, doi = {10.1007/978-3-319-12087-4\_12}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiangDWL13, author = {Hongliang Liang and Yu Dong and Bin Wang and Shuchang Liu}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {EAdroid: Providing Environment Adaptive Security for Android System}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {118--131}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_8}, doi = {10.1007/978-3-319-12087-4\_8}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiangDWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuCL13, author = {Mingjie Liu and Jiazhe Chen and Hexin Li}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Partially Known Nonces and Fault Injection Attacks on {SM2} Signature Algorithm}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {343--358}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_22}, doi = {10.1007/978-3-319-12087-4\_22}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuGW13, author = {Zhe Liu and Johann Gro{\ss}sch{\"{a}}dl and Duncan S. Wong}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit {AVR} Processors}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {217--235}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_14}, doi = {10.1007/978-3-319-12087-4\_14}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiuGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuSWZZ13, author = {Shengli Liu and Kouichi Sakurai and Jian Weng and Fangguo Zhang and Yunlei Zhao}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Security Model and Analysis of FHMQV, Revisited}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {255--269}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_16}, doi = {10.1007/978-3-319-12087-4\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LiuSWZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/SunHSXW13, author = {Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {39--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_3}, doi = {10.1007/978-3-319-12087-4\_3}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/SunHSXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TangLQXG13, author = {Chunming Tang and Yu Lou and Yanfeng Qi and Maozhi Xu and Baoan Guo}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {A Note on Semi-bent and Hyper-bent Boolean Functions}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {3--21}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_1}, doi = {10.1007/978-3-319-12087-4\_1}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TangLQXG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuWZZD13, author = {Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {LHash: {A} Lightweight Hash Function}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {291--308}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_19}, doi = {10.1007/978-3-319-12087-4\_19}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WuWZZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Xu13, author = {Yunqing Xu}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {On the Key-Stream Periods Probability of Edon80}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {55--69}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_4}, doi = {10.1007/978-3-319-12087-4\_4}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Xu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangWDQCS13, author = {Lei Zhang and Qianhong Wu and Josep Domingo{-}Ferrer and Bo Qin and Sherman S. M. Chow and Wenchang Shi}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {239--254}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_15}, doi = {10.1007/978-3-319-12087-4\_15}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangWDQCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhaoGLZ13, author = {Ruoxu Zhao and Dawu Gu and Juanru Li and Yuanyuan Zhang}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Automatic Detection and Analysis of Encrypted Messages in Malware}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {101--117}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_7}, doi = {10.1007/978-3-319-12087-4\_7}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhaoGLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhouLZ13, author = {Jianqin Zhou and Wanquan Liu and Guanglu Zhou}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Cube Theory and Stable k -Error Linear Complexity for Periodic Sequences}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {70--85}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_5}, doi = {10.1007/978-3-319-12087-4\_5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhouLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZouWW13, author = {Jian Zou and Wenling Wu and Shuang Wu}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Cryptanalysis of the Round-Reduced {GOST} Hash Function}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {309--322}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_20}, doi = {10.1007/978-3-319-12087-4\_20}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZouWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.