diff --git a/README.md b/README.md old mode 100755 new mode 100644 diff --git a/__init__.py b/__init__.py old mode 100755 new mode 100644 diff --git a/abbrev.bibyml b/abbrev.bibyml index 0c04ac6..1550eba 100755 --- a/abbrev.bibyml +++ b/abbrev.bibyml @@ -5438,10 +5438,14 @@ icics: name: @0: "ICICS 15: 17th " # icicsname @2: "ICICS 15" # icicsname - ed: "" - vol: "" - addr: "" - month: "" + ed: "Sihan Qing and Eiji Okamoto and Kwangjo Kim and Dongmei Liu" + vol: "9543" + addr: + @0: "Beijing, China" + @1: "" + month: + @0: dec # "~9--11," + @1: dec 16: "ICICS16" key: "ICICS 2016" name: @@ -8064,15 +8068,26 @@ pkc: month: @0: mar # "~30~--~" # apr # "~1," @1: mar # "~/~" # apr - 16: "PKC16" - key: "PKC 2016" - name: - @0: "PKC~2016: 19th " # pkcname_v2 - @2: "PKC~2016" # pkcname_v2 - ed: "" - vol: "" - addr: "" - month: "" + 16: + -1: "PKC16-1" + -2: "PKC16-2" + key1: "PKC 2016, Part I" + key2: "PKC 2016, Part II" + name1: + @0: "PKC~2016: 19th " # pkcname_v2 # ", Part I" + @2: "PKC~2016" # pkcname_v2 # ", Part I" + name2: + @0: "PKC~2016: 19th " # pkcname_v2 # ", Part II" + @2: "PKC~2016" # pkcname_v2 # ", Part II" + ed: "Chen-Mou Cheng and Kai-Min Chung and Giuseppe Persiano and Bo-Yin Yang" + vol1: "9614" + vol2: "9615" + addr: + @0: "Taipei, Taiwan" + @1: "" + month: + @0: mar # "~6--9," + @1: mar 17: "PKC17" key: "PKC 2017" name: diff --git a/changes.txt b/changes.txt index 7952fcf..adb53d4 100755 --- a/changes.txt +++ b/changes.txt @@ -1,3 +1,6 @@ +* 2016-03-11 +ICICS 2015, PKC 2016 + * 2016-02-11 ISC 2013, CTRSA 2016, EPRINT (up to 2016/118), JC 2015 (Number 4), JC 2016 (Number 1) diff --git a/config.py b/config.py old mode 100755 new mode 100644 diff --git a/crypto_conf_list.bib b/crypto_conf_list.bib index 3fe0855..5025c53 100755 --- a/crypto_conf_list.bib +++ b/crypto_conf_list.bib @@ -5312,6 +5312,71 @@ @Proceedings{ICCSA07-3 % ICICS %------------------------------------------------------------------ +@Proceedings{ICICS20, + key = icics20key, + editor = icics20ed, + title = icics20name, + booktitle = icics20name, + volume = icics20vol, + month = icics20month, + address = icics20addr, + publisher = icicspub, + series = mylncs, + year = 2020, +} + +@Proceedings{ICICS19, + key = icics19key, + editor = icics19ed, + title = icics19name, + booktitle = icics19name, + volume = icics19vol, + month = icics19month, + address = icics19addr, + publisher = icicspub, + series = mylncs, + year = 2019, +} + +@Proceedings{ICICS18, + key = icics18key, + editor = icics18ed, + title = icics18name, + booktitle = icics18name, + volume = icics18vol, + month = icics18month, + address = icics18addr, + publisher = icicspub, + series = mylncs, + year = 2018, +} + +@Proceedings{ICICS17, + key = icics17key, + editor = icics17ed, + title = icics17name, + booktitle = icics17name, + volume = icics17vol, + month = icics17month, + address = icics17addr, + publisher = icicspub, + series = mylncs, + year = 2017, +} + +@Proceedings{ICICS16, + key = icics16key, + editor = icics16ed, + title = icics16name, + booktitle = icics16name, + volume = icics16vol, + month = icics16month, + address = icics16addr, + publisher = icicspub, + series = mylncs, + year = 2016, +} + @Proceedings{ICICS15, key = icics15key, editor = icics15ed, @@ -7670,6 +7735,84 @@ @Proceedings{PAIRING07 % PKC %------------------------------------------------------------------ +@Proceedings{PKC20, + key = pkc20key, + editor = pkc20ed, + title = pkc20name, + booktitle = pkc20name, + volume = pkc20vol, + month = pkc20month, + address = pkc20addr, + publisher = pkcpub, + series = mylncs, + year = 2020, +} + +@Proceedings{PKC19, + key = pkc19key, + editor = pkc19ed, + title = pkc19name, + booktitle = pkc19name, + volume = pkc19vol, + month = pkc19month, + address = pkc19addr, + publisher = pkcpub, + series = mylncs, + year = 2019, +} + +@Proceedings{PKC18, + key = pkc18key, + editor = pkc18ed, + title = pkc18name, + booktitle = pkc18name, + volume = pkc18vol, + month = pkc18month, + address = pkc18addr, + publisher = pkcpub, + series = mylncs, + year = 2018, +} + +@Proceedings{PKC17, + key = pkc17key, + editor = pkc17ed, + title = pkc17name, + booktitle = pkc17name, + volume = pkc17vol, + month = pkc17month, + address = pkc17addr, + publisher = pkcpub, + series = mylncs, + year = 2017, +} + +@Proceedings{PKC16-1, + key = pkc16key1, + editor = pkc16ed, + title = pkc16name1, + booktitle = pkc16name1, + volume = pkc16vol1, + month = pkc16month, + address = pkc16addr, + publisher = pkcpub, + series = mylncs, + year = 2016, +} + +@Proceedings{PKC16-2, + key = pkc16key2, + editor = pkc16ed, + title = pkc16name2, + booktitle = pkc16name2, + volume = pkc16vol2, + month = pkc16month, + address = pkc16addr, + publisher = pkcpub, + series = mylncs, + year = 2016, +} + @Proceedings{PKC15, key = pkc15key, editor = pkc15ed, diff --git a/crypto_db.bib b/crypto_db.bib index 7e80486..0f83d86 100755 --- a/crypto_db.bib +++ b/crypto_db.bib @@ -20,7 +20,7 @@ % FOCS: 1980 - 2015 % FSE: 1993 - 2015 % ICALP: 2004 - 2015 -% ICICS: 1997 - 2014 +% ICICS: 1997 - 2015 % ICISC: 1998 - 2014 % ICITS: 2008 - 2015 % IMA: 1995 - 2015 @@ -33,7 +33,7 @@ % LC: 2010 - 2015 % NDSS: 1997 - 2015 % PAIRING: 2007 - 2013 -% PKC: 1998 - 2015 +% PKC: 1998 - 2016 % PODC: 1982 - 2015 % PROVSEC: 2007 - 2015 % RSA: 2001 - 2016 @@ -121590,6 +121590,438 @@ @InProceedings{ICALP:NPSY94 crossref = icalp94, } +@InProceedings{ICICS:Geneiatakis15, + author = "Dimitris Geneiatakis", + title = "Minimizing Databases Attack Surface Against {SQL} Injection Attacks", + pages = "1--9", + doi = "10.1007/978-3-319-29814-6_1", + crossref = icics15, +} + +@InProceedings{ICICS:CLGW15, + author = "Zhifeng Chen and + Qingbao Li and + Songhui Guo and + Ye Wang", + title = "Ensuring Kernel Integrity Using {KIPBMFH}", + pages = "10--17", + doi = "10.1007/978-3-319-29814-6_2", + crossref = icics15, +} + +@InProceedings{ICICS:BaoLuoLin15, + author = "Zhenzhen Bao and + Peng Luo and + Dongdai Lin", + title = "Bitsliced Implementations of the {PRINCE}, {LED} and {RECTANGLE} Block Ciphers on {AVR} 8-Bit Microcontrollers", + pages = "18--36", + doi = "10.1007/978-3-319-29814-6_3", + crossref = icics15, +} + +@InProceedings{ICICS:WanLv15a, + author = "Wenwen Wang and + Kewei Lv", + title = "On Promise Problem of the Generalized Shortest Vector Problem", + pages = "37--49", + doi = "10.1007/978-3-319-29814-6_4", + crossref = icics15, +} + +@InProceedings{ICICS:WJTW15, + author = "Xuanxuan Wang and + Lihuan Jiang and + Lars Thiele and + Yongming Wang", + title = "Secret Key Extraction with Quantization Randomness Using {Hadamard} Matrix on {QuaDRiGa} Channel", + pages = "50--61", + doi = "10.1007/978-3-319-29814-6_5", + crossref = icics15, +} + +@InProceedings{ICICS:CFZCWH15, + author = "Weiqiong Cao and + Jingyi Feng and + Shaofeng Zhu and + Hua Chen and + Wenling Wu and + Xucang Han and + Xiaoguang Zheng", + title = "Practical Lattice-Based Fault Attack and Countermeasure on {SM2} Signature Algorithm", + pages = "62--70", + doi = "10.1007/978-3-319-29814-6_6", + crossref = icics15, +} + +@InProceedings{ICICS:WanLv15b, + author = "Yao Wang and + Kewei Lv", + title = "The Security of Polynomial Information of {Diffie}-{Hellman} Key", + pages = "71--81", + doi = "10.1007/978-3-319-29814-6_7", + crossref = icics15, +} + +@InProceedings{ICICS:ZhaCha15, + author = "Zhichao Zhao and + T.-H. Hubert Chan", + title = "How to Vote Privately Using Bitcoin", + pages = "82--96", + doi = "10.1007/978-3-319-29814-6_8", + crossref = icics15, +} + +@InProceedings{ICICS:XJHL15, + author = "Hong Xu and + Ping Jia and + Geshi Huang and + Xuejia Lai", + title = "Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round {LBlock}-s", + pages = "97--108", + doi = "10.1007/978-3-319-29814-6_9", + crossref = icics15, +} + +@InProceedings{ICICS:LiuWon15, + author = "Zhen Liu and + Duncan S. Wong", + title = "Traceable {CP}-{ABE} on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable", + pages = "109--124", + doi = "10.1007/978-3-319-29814-6_10", + crossref = icics15, +} + +@InProceedings{ICICS:Hirose15, + author = "Shoichi Hirose", + title = "Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity", + pages = "125--140", + doi = "10.1007/978-3-319-29814-6_11", + crossref = icics15, +} + +@InProceedings{ICICS:DZSH15, + author = "Xuejie Ding and + Meng Zhang and + Jun Shi and + {Wei-qing} Huang", + title = "A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal", + pages = "141--151", + doi = "10.1007/978-3-319-29814-6_12", + crossref = icics15, +} + +@InProceedings{ICICS:YQZWF15, + author = "Bo Yang and + Yu Qin and + Yingjun Zhang and + Weijin Wang and + Dengguo Feng", + title = "{TMSUI}: {A} Trust Management Scheme of {USB} Storage Devices for Industrial Control Systems", + pages = "152--168", + doi = "10.1007/978-3-319-29814-6_13", + crossref = icics15, +} + +@InProceedings{ICICS:ZhoLiuWan15, + author = "Jianqin Zhou and + Wanquan Liu and + Xifeng Wang", + title = "Characterization of the Third Descent Points for the $k$-error Linear Complexity of $2^n$-periodic Binary Sequences", + pages = "169--183", + doi = "10.1007/978-3-319-29814-6_14", + crossref = icics15, +} + +@InProceedings{ICICS:TZGLML15, + author = "Chenyang Tu and + Jian Zhou and + Neng Gao and + Zeyi Liu and + Yuan Ma and + Zongbin Liu", + title = "{QRL}: {A} High Performance Quadruple-Rail Logic for Resisting {DPA} on {FPGA} Implementations", + pages = "184--198", + doi = "10.1007/978-3-319-29814-6_15", + crossref = icics15, +} + +@InProceedings{ICICS:YuBai15, + author = "Haibo Yu and + Guoqiang Bai", + title = "Strategy of Relations Collection in Factoring {RSA} Modulus", + pages = "199--211", + doi = "10.1007/978-3-319-29814-6_16", + crossref = icics15, +} + +@InProceedings{ICICS:ZhaBai15, + author = "Dan Zhang and + Guoqiang Bai", + title = "Ultra High-Performance {ASIC} Implementation of {SM2} with {SPA} Resistance", + pages = "212--219", + doi = "10.1007/978-3-319-29814-6_17", + crossref = icics15, +} + +@InProceedings{ICICS:LiXuJi15, + author = "Peili Li and + Haixia Xu and + Yuanyuan Ji", + title = "Multi-input Functional Encryption and Its Application in Outsourcing Computation", + pages = "220--235", + doi = "10.1007/978-3-319-29814-6_18", + crossref = icics15, +} + +@InProceedings{ICICS:YasSak15, + author = "Takanori Yasuda and + Kouichi Sakurai", + title = "A Multivariate Encryption Scheme with {Rainbow}", + pages = "236--251", + doi = "10.1007/978-3-319-29814-6_19", + crossref = icics15, +} + +@InProceedings{ICICS:SahSar15, + author = "Rajeev Anand Sahu and + Vishal Saraswat", + title = "Efficient and Secure Many-to-One Signature Delegation", + pages = "252--259", + doi = "10.1007/978-3-319-29814-6_20", + crossref = icics15, +} + +@InProceedings{ICICS:ZGXM15, + author = "Jie Zhang and + Aijun Ge and + Siyu Xiao and + Chuangui Ma", + title = "Fully Secure {IBE} with Tighter Reduction in Prime Order Bilinear Groups", + pages = "260--268", + doi = "10.1007/978-3-319-29814-6_21", + crossref = icics15, +} + +@InProceedings{ICICS:MCMS15, + author = "Hongwei Meng and + Zhong Chen and + Ziqian Meng and + Chuck Song", + title = "A Secure Route Optimization Mechanism for Expressive Internet Architecture ({XIA}) Mobility", + pages = "269--281", + doi = "10.1007/978-3-319-29814-6_22", + crossref = icics15, +} + +@InProceedings{ICICS:MamGhoSta15, + author = "Mohammad Saiful Islam Mamun and + Ali A. Ghorbani and + Natalia Stakhanova", + title = "An Entropy Based Encrypted Traffic Classifier", + pages = "282--294", + doi = "10.1007/978-3-319-29814-6_23", + crossref = icics15, +} + +@InProceedings{ICICS:ZhaJiaDin15, + author = "Qian Zhang and + Ying Jiang and + Liping Ding", + title = "Modelling and Analysis of Network Security - a Probabilistic Value-passing {CCS} Approach", + pages = "295--302", + doi = "10.1007/978-3-319-29814-6_24", + crossref = icics15, +} + +@InProceedings{ICICS:SYHWH15, + author = "Degang Sun and + Kun Yang and + {Wei-qing} Huang and + Yan Wang and + Bo Hu", + title = "An Improved {NPCUSUM} Method with Adaptive Sliding Window to Detect {DDoS} Attacks", + pages = "303--310", + doi = "10.1007/978-3-319-29814-6_25", + crossref = icics15, +} + +@InProceedings{ICICS:FDCH15, + author = "Wenjun Fan and + Zhihui Du and + David Fern{\'a}ndez Cambronero and + Xinning Hui", + title = "Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection Mechanism", + pages = "311--319", + doi = "10.1007/978-3-319-29814-6_26", + crossref = icics15, +} + +@InProceedings{ICICS:POKY15, + author = "Ady Wahyudi Paundu and + Takeshi Okuda and + Youki Kadobayashi and + Suguru Yamaguchi", + title = "Leveraging Static Probe Instrumentation for {VM}-based Anomaly Detection System", + pages = "320--334", + doi = "10.1007/978-3-319-29814-6_27", + crossref = icics15, +} + +@InProceedings{ICICS:SYSWL15, + author = "Zizhou Sun and + Yahui Yang and + Qingni Shen and + Zhonghai Wu and + Xiaochen Li", + title = "{MB}-{DDIVR}: {A} Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage", + pages = "335--345", + doi = "10.1007/978-3-319-29814-6_28", + crossref = icics15, +} + +@InProceedings{ICICS:JXLZZJ15, + author = "Yafei Ji and + Luning Xia and + Jingqiang Lin and + Jian Zhou and + Guozhu Zhang and + Shijie Jia", + title = "Chameleon: {A} Lightweight Method for Thwarting Relay Attacks in Near Field Communication", + pages = "346--355", + doi = "10.1007/978-3-319-29814-6_29", + crossref = icics15, +} + +@InProceedings{ICICS:ZhaZha15, + author = "Xue Zhang and + Rui Zhang", + title = "A Solution of Code Authentication on Android", + pages = "356--362", + doi = "10.1007/978-3-319-29814-6_30", + crossref = icics15, +} + +@InProceedings{ICICS:LWCXG15, + author = "Muhua Liu and + Ying Wu and + Jinyong Chang and + Rui Xue and + Wei Guo", + title = "Verifiable Proxy Re-encryption from Indistinguishability Obfuscation", + pages = "363--378", + doi = "10.1007/978-3-319-29814-6_31", + crossref = icics15, +} + +@InProceedings{ICICS:TZZQ15, + author = "Jiehui Tang and + Yongbin Zhou and + Hailong Zhang and + Shuang Qiu", + title = "Higher-Order Masking Schemes for {Simon}", + pages = "379--392", + doi = "10.1007/978-3-319-29814-6_32", + crossref = icics15, +} + +@InProceedings{ICICS:CYYZY15, + author = "Nairen Cao and + Xiaoqi Yu and + Yufang Yang and + Linru Zhang and + Siu-Ming Yiu", + title = "An {ORAM} Scheme with Improved Worst-Case Computational Overhead", + pages = "393--405", + doi = "10.1007/978-3-319-29814-6_33", + crossref = icics15, +} + +@InProceedings{ICICS:XHQLH15, + author = "Chuiyi Xie and + Ying Huo and + Sihan Qing and + Shoushan Luo and + Lingli Hu", + title = "A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System", + pages = "406--413", + doi = "10.1007/978-3-319-29814-6_34", + crossref = icics15, +} + +@InProceedings{ICICS:FSZD15, + author = "Hongbo Fan and + Shupeng Shi and + Jing Zhang and + Li Dong", + title = "Suffix Type String Matching Algorithms Based on Multi-windows and Integer Comparison", + pages = "414--420", + doi = "10.1007/978-3-319-29814-6_35", + crossref = icics15, +} + +@InProceedings{ICICS:CheHeCha15, + author = "Depeng Chen and + Daojing He and + Sammy Chan", + title = "Security-Enhanced Reprogramming with {XORs} Coding in Wireless Sensor Networks", + pages = "421--435", + doi = "10.1007/978-3-319-29814-6_36", + crossref = icics15, +} + +@InProceedings{ICICS:Palmieri15, + author = "Paolo Palmieri", + title = "Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks", + pages = "436--444", + doi = "10.1007/978-3-319-29814-6_37", + crossref = icics15, +} + +@InProceedings{ICICS:MonPes15, + author = "Viktor Monarev and + Andrey Pestunov", + title = "Prior Classification of Stego Containers as a New Approach for Enhancing Steganalyzers Accuracy", + pages = "445--457", + doi = "10.1007/978-3-319-29814-6_38", + crossref = icics15, +} + +@InProceedings{ICICS:DSLYWW15, + author = "Chuntao Dong and + Qingni Shen and + Wenting Li and + Yahui Yang and + Zhonghai Wu and + Xiang Wan", + title = "Eavesdropper: {A} Framework for Detecting the Location of the Processed Result in Hadoop", + pages = "458--466", + doi = "10.1007/978-3-319-29814-6_39", + crossref = icics15, +} + +@InProceedings{ICICS:LLCL15, + author = "Shangqi Lai and + Joseph K. Liu and + Kim-Kwang Raymond Choo and + Kaitai Liang", + title = "Secret Picture: An Efficient Tool for Mitigating Deletion Delay on {OSN}", + pages = "467--477", + doi = "10.1007/978-3-319-29814-6_40", + crossref = icics15, +} + +@InProceedings{ICICS:WZFFC15, + author = "Rong Wang and + Min Zhang and + Dengguo Feng and + Yanyan Fu and + Zhenyu Chen", + title = "A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences", + pages = "478--484", + doi = "10.1007/978-3-319-29814-6_41", + crossref = icics15, +} + @InProceedings{ICICS:SHSZSH14, author = "Ling Song and Lei Hu and @@ -132772,7 +133204,7 @@ @InProceedings{SP:NWIWTS15 } @InProceedings{SP:FVKKKM15, - author = "Ben A. Fisc and + author = "Ben A. Fisch and Binh Vo and Fernando Krell and Abishek Kumarasubramanian and @@ -166527,6 +166959,354 @@ @InProceedings{PAIRING:GuiMuChe07 crossref = pairing07, } +@InProceedings{PKC:MatHan16, + author = "Takahiro Matsuda and + Goichiro Hanaoka", + title = "Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security", + pages = "3--34", + doi = "10.1007/978-3-662-49384-7_1", + crossref = pkc16-1, +} + +@InProceedings{PKC:FauMasVen16, + author = "Sebastian Faust and + Daniel Masny and + Daniele Venturi", + title = "Chosen-Ciphertext Security from Subset Sum", + pages = "35--46", + doi = "10.1007/978-3-662-49384-7_2", + crossref = pkc16-1, +} + +@InProceedings{PKC:BerFisWar16, + author = "David Bernhard and + Marc Fischlin and + Bogdan Warinschi", + title = "On the Hardness of Proving {CCA}-Security of Signed {ElGamal}", + pages = "47--69", + doi = "10.1007/978-3-662-49384-7_3", + crossref = pkc16-1, +} + +@InProceedings{PKC:LDMSW16, + author = "Junzuo Lai and + Robert H. Deng and + Changshe Ma and + Kouichi Sakurai and + Jian Weng", + title = "{CCA}-Secure Keyed-Fully Homomorphic Encryption", + pages = "70--98", + doi = "10.1007/978-3-662-49384-7_4", + crossref = pkc16-1, +} + +@InProceedings{PKC:KMHT16, + author = "Fuyuki Kitagawa and + Takahiro Matsuda and + Goichiro Hanaoka and + Keisuke Tanaka", + title = "On the Key Dependent Message Security of the {Fujisaki}-{Okamoto} Constructions", + pages = "99--129", + doi = "10.1007/978-3-662-49384-7_5", + crossref = pkc16-1, +} + +@InProceedings{PKC:GCDCT16, + author = "Junqing Gong and + Jie Chen and + Xiaolei Dong and + Zhenfu Cao and + Shaohua Tang", + title = "Extended Nested Dual System Groups, Revisited", + pages = "133--163", + doi = "10.1007/978-3-662-49384-7_6", + crossref = pkc16-1, +} + +@InProceedings{PKC:DatDutMuk16, + author = "Pratish Datta and + Ratna Dutta and + Sourav Mukhopadhyay", + title = "Functional Encryption for Inner Product with Full Function Privacy", + pages = "164--195", + doi = "10.1007/978-3-662-49384-7_7", + crossref = pkc16-1, +} + +@InProceedings{PKC:DeCIovONe16, + author = "Angelo {De Caro} and + Vincenzo Iovino and + Adam O'Neill", + title = "Deniable Functional Encryption", + pages = "196--222", + doi = "10.1007/978-3-662-49384-7_8", + crossref = pkc16-1, +} + +@InProceedings{PKC:Joye16, + author = "Marc Joye", + title = "Identity-Based Cryptosystems and Quadratic Residuosity", + pages = "225--254", + doi = "10.1007/978-3-662-49384-7_9", + crossref = pkc16-1, +} + +@InProceedings{PKC:WatShi16, + author = "Yohei Watanabe and + Junji Shikata", + title = "Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles", + pages = "255--279", + doi = "10.1007/978-3-662-49384-7_10", + crossref = pkc16-1, +} + +@InProceedings{PKC:SakAttHan16, + author = "Yusuke Sakai and + Nuttapong Attrapadung and + Goichiro Hanaoka", + title = "Attribute-Based Signatures for Circuits from Bilinear Map", + pages = "283--300", + doi = "10.1007/978-3-662-49384-7_11", + crossref = pkc16-1, +} + +@InProceedings{PKC:FKMSSS16, + author = "Nils Fleischhacker and + Johannes Krupp and + Giulio Malavolta and + Jonas Schneider and + Dominique Schr{\"o}der and + Mark Simkin", + title = "Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys", + pages = "301--330", + doi = "10.1007/978-3-662-49384-7_12", + crossref = pkc16-1, +} + +@InProceedings{PKC:HKKKR16, + author = "Gunnar Hartung and + Bj{\"o}rn Kaidel and + Alexander Koch and + Jessica Koch and + Andy Rupp", + title = "Fault-Tolerant Aggregate Signatures", + pages = "331--356", + doi = "10.1007/978-3-662-49384-7_13", + crossref = pkc16-1, +} + +@InProceedings{PKC:BacMeiSch16, + author = "Michael Backes and + Sebastian Meiser and + Dominique Schr{\"o}der", + title = "Delegatable Functional Signatures", + pages = "357--386", + doi = "10.1007/978-3-662-49384-7_14", + crossref = pkc16-1, +} + +@InProceedings{PKC:HulRijSon16, + author = "Andreas H{\"u}lsing and + Joost Rijneveld and + Fang Song", + title = "Mitigating Multi-target Attacks in Hash-Based Signatures", + pages = "387--416", + doi = "10.1007/978-3-662-49384-7_15", + crossref = pkc16-1, +} + +@InProceedings{PKC:KSSFAN16, + author = "Johannes Krupp and + Dominique Schr{\"o}der and + Mark Simkin and + Dario Fiore and + Giuseppe Ateniese and + Stefan N{\"u}rnberger", + title = "Nearly Optimal Verifiable Data Streaming", + pages = "417--445", + doi = "10.1007/978-3-662-49384-7_16", + crossref = pkc16-1, +} + +@InProceedings{PKC:HulRijSch16, + author = "Andreas H{\"u}lsing and + Joost Rijneveld and + Peter Schwabe", + title = "{ARMed} {SPHINCS} - Computing a 41 {KB} Signature in 16 {KB} of {RAM}", + pages = "446--470", + doi = "10.1007/978-3-662-49384-7_17", + crossref = pkc16-1, +} + +@InProceedings{PKC:PetKosMes16, + author = "Christophe Petit and + Michiel Kosters and + Ange Messeng", + title = "Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields", + pages = "3--18", + doi = "10.1007/978-3-662-49387-8_1", + crossref = pkc16-2, +} + +@InProceedings{PKC:NevTib16, + author = "Samuel Neves and + Mehdi Tibouchi", + title = "Degenerate Curve Attacks - Extending Invalid Curve Attacks to {Edwards} Curves and Other Models", + pages = "19--35", + doi = "10.1007/978-3-662-49387-8_2", + crossref = pkc16-2, +} + +@InProceedings{PKC:BCTV16, + author = "Fabrice Benhamouda and + C{\'e}line Chevalier and + Adrian Thillard and + Damien Vergnaud", + title = "Easing {Coppersmith} Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness", + pages = "36--66", + doi = "10.1007/978-3-662-49387-8_3", + crossref = pkc16-2, +} + +@InProceedings{PKC:TakKun16, + author = "Atsushi Takayasu and + Noboru Kunihiro", + title = "How to Generalize {RSA} Cryptanalyses", + pages = "67--97", + doi = "10.1007/978-3-662-49387-8_4", + crossref = pkc16-2, +} + +@InProceedings{PKC:DGLOZ16, + author = "Dana {Dachman-Soled} and + S. Dov Gordon and + Feng-Hao Liu and + Adam O'Neill and + Hong-Sheng Zhou", + title = "Leakage-Resilient Public-Key Encryption from Obfuscation", + pages = "101--128", + doi = "10.1007/978-3-662-49387-8_5", + crossref = pkc16-2, +} + +@InProceedings{PKC:HajKapSri16, + author = "Mohammad Hajiabadi and + Bruce M. Kapron and + Venkatesh Srinivasan", + title = "On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes", + pages = "129--158", + doi = "10.1007/978-3-662-49387-8_6", + crossref = pkc16-2, +} + +@InProceedings{PKC:Wee16, + author = "Hoeteck Wee", + title = "{KDM}-Security via Homomorphic Smooth Projective Hashing", + pages = "159--179", + doi = "10.1007/978-3-662-49387-8_7", + crossref = pkc16-2, +} + +@InProceedings{PKC:Cohen16, + author = "Ran Cohen", + title = "Asynchronous Secure Multiparty Computation in Constant Time", + pages = "183--207", + doi = "10.1007/978-3-662-49387-8_8", + crossref = pkc16-2, +} + +@InProceedings{PKC:DamPolRao16, + author = "Ivan Damg{\r a}rd and + Antigoni Polychroniadou and + Vanishree Rao", + title = "Adaptively Secure Multi-Party Computation from {LWE} (via Equivocal {FHE})", + pages = "208--233", + doi = "10.1007/978-3-662-49387-8_9", + crossref = pkc16-2, +} + +@InProceedings{PKC:CamDriLeh16, + author = "Jan Camenisch and + Manu Drijvers and + Anja Lehmann", + title = "Universally Composable Direct Anonymous Attestation", + pages = "234--264", + doi = "10.1007/978-3-662-49387-8_10", + crossref = pkc16-2, +} + +@InProceedings{PKC:CanShaVal16, + author = "Ran Canetti and + Daniel Shahaf and + Margarita Vald", + title = "Universally Composable Authentication and Key-Exchange with Global {PKI}", + pages = "265--296", + doi = "10.1007/978-3-662-49387-8_11", + crossref = pkc16-2, +} + +@InProceedings{PKC:Brandao16, + author = "Lu{\'\i}s T. A. N. Brand{\~a}o", + title = "Very-Efficient Simulatable Flipping of Many Coins into a Well - (and a New Universally-Composable Commitment Scheme)", + pages = "297--326", + doi = "10.1007/978-3-662-49387-8_12", + crossref = pkc16-2, +} + +@InProceedings{PKC:BisPas16, + author = "Allison Bishop and + Valerio Pastro", + title = "Robust Secret Sharing Schemes Against Local Adversaries", + pages = "327--356", + doi = "10.1007/978-3-662-49387-8_13", + crossref = pkc16-2, +} + +@InProceedings{PKC:ChaRagVin16, + author = "Nishanth Chandran and + Srinivasan Raghuraman and + Dhinakaran Vinayagamurthy", + title = "Reducing Depth in Constrained {PRFs}: From Bit-Fixing to $\mathbf{NC}^1$", + pages = "359--385", + doi = "10.1007/978-3-662-49387-8_14", + crossref = pkc16-2, +} + +@InProceedings{PKC:CQZDC16, + author = "Yu Chen and + Baodong Qin and + Jiang Zhang and + Yi Deng and + Sherman S. M. Chow", + title = "Non-Malleable Functions and Their Applications", + pages = "386--416", + doi = "10.1007/978-3-662-49387-8_15", + crossref = pkc16-2, +} + +@InProceedings{PKC:BBDIR16, + author = "Eli {Ben-Sasson} and + Iddo {Ben-Tov} and + Ivan Damg{\r a}rd and + Yuval Ishai and + Noga {Ron-Zewi}", + title = "On Public Key Encryption from Noisy Codewords", + pages = "417--446", + doi = "10.1007/978-3-662-49387-8_16", + crossref = pkc16-2, +} + +@InProceedings{PKC:LPST16, + author = "Huijia Lin and + Rafael Pass and + Karn Seth and + Sidharth Telang", + title = "Indistinguishability Obfuscation with Non-trivial Efficiency", + pages = "447--462", + doi = "10.1007/978-3-662-49387-8_17", + crossref = pkc16-2, +} + @InProceedings{PKC:LiuPat15, author = "Shengli Liu and Kenneth G. Paterson", @@ -251130,16 +251910,13 @@ @Misc{EPRINT:DNSL15b note = "\url{http://eprint.iacr.org/2015/1138}", } -@Misc{EPRINT:GCDCT15, - author = "Junqing Gong and - Jie Chen and - Xiaolei Dong and - Zhenfu Cao and - Shaohua Tang", - title = "Extended Nested Dual System Groups, Revisited", +@Misc{EPRINT:WesJun15, + author = "Benjamin Wesolowski and + Pascal Junod", + title = "Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/820", - note = "\url{http://eprint.iacr.org/2015/820}", + howpublished = "Cryptology ePrint Archive, Report 2015/836", + note = "\url{http://eprint.iacr.org/2015/836}", } @Misc{EPRINT:DamZak15, @@ -251368,14 +252145,15 @@ @Misc{EPRINT:GuoZhaXu15 note = "\url{http://eprint.iacr.org/2015/1216}", } -@Misc{EPRINT:CorLepTib15, +@Misc{EPRINT:CFRZ15, author = "Jean-Sebastien Coron and - Tancrede Lepoint and - Mehdi Tibouchi", - title = "New Multilinear Maps over the Integers", + Jean-Charles Faugere and + Guenael Renault and + Rina Zeitoun", + title = "Factoring $N=p^r q^s$ for Large $r$ and $s$", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/162", - note = "\url{http://eprint.iacr.org/2015/162}", + howpublished = "Cryptology ePrint Archive, Report 2015/071", + note = "\url{http://eprint.iacr.org/2015/071}", } @Misc{EPRINT:LiWan15, @@ -251741,17 +252519,6 @@ @Misc{EPRINT:KTBBKM15 note = "\url{http://eprint.iacr.org/2015/438}", } -@Misc{EPRINT:HFBN15, - author = "Patrick Haddad and - Viktor Fischer and - Florent Bernard and - Jean Nicolai", - title = "A Physical Approach for Stochastic Modeling of {TERO}-based {TRNG}", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/593", - note = "\url{http://eprint.iacr.org/2015/593}", -} - @Misc{EPRINT:SarSin15, author = "Palash Sarkar and Shashank Singh", @@ -252823,13 +253590,16 @@ @Misc{EPRINT:LibPetYun15 note = "\url{http://eprint.iacr.org/2015/743}", } -@Misc{EPRINT:WesJun15, - author = "Benjamin Wesolowski and - Pascal Junod", - title = "Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys", +@Misc{EPRINT:GCDCT15, + author = "Junqing Gong and + Jie Chen and + Xiaolei Dong and + Zhenfu Cao and + Shaohua Tang", + title = "Extended Nested Dual System Groups, Revisited", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/836", - note = "\url{http://eprint.iacr.org/2015/836}", + howpublished = "Cryptology ePrint Archive, Report 2015/820", + note = "\url{http://eprint.iacr.org/2015/820}", } @Misc{EPRINT:Morawiecki15b, @@ -253967,15 +254737,14 @@ @Misc{EPRINT:LZFD15b note = "\url{http://eprint.iacr.org/2015/994}", } -@Misc{EPRINT:CFRZ15, +@Misc{EPRINT:CorLepTib15, author = "Jean-Sebastien Coron and - Jean-Charles Faugere and - Guenael Renault and - Rina Zeitoun", - title = "Factoring $N=p^r q^s$ for Large $r$ and $s$", + Tancrede Lepoint and + Mehdi Tibouchi", + title = "New Multilinear Maps over the Integers", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/071", - note = "\url{http://eprint.iacr.org/2015/071}", + howpublished = "Cryptology ePrint Archive, Report 2015/162", + note = "\url{http://eprint.iacr.org/2015/162}", } @Misc{EPRINT:OdeDasGos15, @@ -254641,6 +255410,15 @@ @Misc{EPRINT:AteFaoKam15 note = "\url{http://eprint.iacr.org/2015/920}", } +@Misc{EPRINT:PoeSib15, + author = "Bertram Poettering and + Dale L. Sibborn", + title = "Cold Boot Attacks in the Discrete Logarithm Setting", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/057", + note = "\url{http://eprint.iacr.org/2015/057}", +} + @Misc{EPRINT:Cohen15, author = "Ran Cohen", title = "Asynchronous Secure Multiparty Computation in Constant Time", @@ -258045,6 +258823,17 @@ @Misc{EPRINT:DurSta15b note = "\url{http://eprint.iacr.org/2015/537}", } +@Misc{EPRINT:HFBN15, + author = "Patrick Haddad and + Viktor Fischer and + Florent Bernard and + Jean Nicolai", + title = "A Physical Approach for Stochastic Modeling of {TERO}-based {TRNG}", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/593", + note = "\url{http://eprint.iacr.org/2015/593}", +} + @Misc{EPRINT:DiaArrRod15, author = "Jesus Diaz and David Arroyo and @@ -260303,15 +261092,6 @@ @Misc{EPRINT:Attrapadung15 note = "\url{http://eprint.iacr.org/2015/390}", } -@Misc{EPRINT:PoeSib15, - author = "Bertram Poettering and - Dale L. Sibborn", - title = "Cold Boot Attacks in the Discrete Logarithm Setting", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/057", - note = "\url{http://eprint.iacr.org/2015/057}", -} - @Misc{EPRINT:AttHanYam15, author = "Nuttapong Attrapadung and Goichiro Hanaoka and @@ -276106,6 +276886,14 @@ @Misc{EPRINT:BanHoePag13 note = "\url{http://eprint.iacr.org/2013/421}", } +@Misc{EPRINT:Mitsunari13, + author = "Shigeo Mitsunari", + title = "A Fast Implementation of the Optimal Ate Pairing over {BN} curve on Intel Haswell Processor", + year = 2013, + howpublished = "Cryptology ePrint Archive, Report 2013/362", + note = "\url{http://eprint.iacr.org/2013/362}", +} + @Misc{EPRINT:TavAta13, author = "Asghar Tavakkoli and Reza Ebrahimi Atani", @@ -276287,14 +277075,6 @@ @Misc{EPRINT:GGHJRW13 note = "\url{http://eprint.iacr.org/2013/239}", } -@Misc{EPRINT:Mitsunari13, - author = "Shigeo Mitsunari", - title = "A Fast Implementation of the Optimal Ate Pairing over {BN} curve on Intel Haswell Processor", - year = 2013, - howpublished = "Cryptology ePrint Archive, Report 2013/362", - note = "\url{http://eprint.iacr.org/2013/362}", -} - @Misc{EPRINT:FZZF13, author = "Guangjun Fan and Yongbin Zhou and @@ -289094,14 +289874,6 @@ @Misc{EPRINT:Vajda11e note = "\url{http://eprint.iacr.org/2011/682}", } -@Misc{EPRINT:Persichetti11, - author = "Edoardo Persichetti", - title = "Compact {McEliece} keys based on Quasi-Dyadic Srivastava codes", - year = 2011, - howpublished = "Cryptology ePrint Archive, Report 2011/179", - note = "\url{http://eprint.iacr.org/2011/179}", -} - @Misc{EPRINT:Toft11, author = "Tomas Toft", title = "Secure Datastructures based on Multiparty Computation", @@ -293167,6 +293939,14 @@ @Misc{EPRINT:BlaAgu11 note = "\url{http://eprint.iacr.org/2011/464}", } +@Misc{EPRINT:Persichetti11, + author = "Edoardo Persichetti", + title = "Compact {McEliece} keys based on Quasi-Dyadic Srivastava codes", + year = 2011, + howpublished = "Cryptology ePrint Archive, Report 2011/179", + note = "\url{http://eprint.iacr.org/2011/179}", +} + @Misc{EPRINT:CatFioWar11a, author = "Dario Catalano and Dario Fiore and @@ -301437,15 +302217,14 @@ @Misc{EPRINT:MTWMM09 note = "\url{http://eprint.iacr.org/2009/185}", } -@Misc{EPRINT:BKMS09, - author = "Erik-Oliver Blass and - Anil Kurmus and - Refik Molva and - Thorsten Strufe", - title = "{PSP}: Private and Secure Payment with {RFID}", +@Misc{EPRINT:JakVenYac09, + author = "Mariusz Jakubowski and + Ramarathnam Venkatesan and + Yacov Yacobi", + title = "Quantifying Trust", year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/181", - note = "\url{http://eprint.iacr.org/2009/181}", + howpublished = "Cryptology ePrint Archive, Report 2009/558", + note = "\url{http://eprint.iacr.org/2009/558}", } @Misc{EPRINT:BanCamKre09, @@ -303024,15 +303803,12 @@ @Misc{EPRINT:Wu09c note = "\url{http://eprint.iacr.org/2009/535}", } -@Misc{EPRINT:LSLQ09, - author = "Ruilin Li and - Bing Sun and - Chao Li and - Longjiang Qu", - title = "Cryptanalysis of a Generalized Unbalanced {Feistel} Network Structure", +@Misc{EPRINT:Wu09a, + author = "Chuan-Kun Wu", + title = "On fractional correlation immunity of majority functions", year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/360", - note = "\url{http://eprint.iacr.org/2009/360}", + howpublished = "Cryptology ePrint Archive, Report 2009/067", + note = "\url{http://eprint.iacr.org/2009/067}", } @Misc{EPRINT:Wu09d, @@ -303252,12 +304028,15 @@ @Misc{EPRINT:Wu09b note = "\url{http://eprint.iacr.org/2009/534}", } -@Misc{EPRINT:Wu09a, - author = "Chuan-Kun Wu", - title = "On fractional correlation immunity of majority functions", +@Misc{EPRINT:LSLQ09, + author = "Ruilin Li and + Bing Sun and + Chao Li and + Longjiang Qu", + title = "Cryptanalysis of a Generalized Unbalanced {Feistel} Network Structure", year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/067", - note = "\url{http://eprint.iacr.org/2009/067}", + howpublished = "Cryptology ePrint Archive, Report 2009/360", + note = "\url{http://eprint.iacr.org/2009/360}", } @Misc{EPRINT:TFKPSS09, @@ -306631,14 +307410,15 @@ @Misc{EPRINT:HSKC09 note = "\url{http://eprint.iacr.org/2009/471}", } -@Misc{EPRINT:JakVenYac09, - author = "Mariusz Jakubowski and - Ramarathnam Venkatesan and - Yacov Yacobi", - title = "Quantifying Trust", +@Misc{EPRINT:BKMS09, + author = "Erik-Oliver Blass and + Anil Kurmus and + Refik Molva and + Thorsten Strufe", + title = "{PSP}: Private and Secure Payment with {RFID}", year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/558", - note = "\url{http://eprint.iacr.org/2009/558}", + howpublished = "Cryptology ePrint Archive, Report 2009/181", + note = "\url{http://eprint.iacr.org/2009/181}", } @Misc{EPRINT:SinBKSASa09, @@ -308854,16 +309634,6 @@ @Misc{EPRINT:BBEL08 note = "\url{http://eprint.iacr.org/2008/062}", } -@Misc{EPRINT:HasMomCha08, - author = "Naoki Hashizume and - Fumiyuki Momose and - Jinhui Chao", - title = "On Implementation of {GHS} Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics", - year = 2008, - howpublished = "Cryptology ePrint Archive, Report 2008/215", - note = "\url{http://eprint.iacr.org/2008/215}", -} - @Misc{EPRINT:SOVS08, author = "Boris Skoric and Chibuzo Obi and @@ -309481,6 +310251,16 @@ @Misc{EPRINT:PriBir08 note = "\url{http://eprint.iacr.org/2008/405}", } +@Misc{EPRINT:HasMomCha08, + author = "Naoki Hashizume and + Fumiyuki Momose and + Jinhui Chao", + title = "On Implementation of {GHS} Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics", + year = 2008, + howpublished = "Cryptology ePrint Archive, Report 2008/215", + note = "\url{http://eprint.iacr.org/2008/215}", +} + @Misc{EPRINT:CorPatSeu08, author = "Jean-Sebastien Coron and Jacques Patarin and @@ -314704,6 +315484,17 @@ @Misc{EPRINT:Boyen07 note = "\url{http://eprint.iacr.org/2007/094}", } +@Misc{EPRINT:LCSL07, + author = "Xiaohui Liang and + Zhenfu Cao and + Jun Shao and + Huang Lin", + title = "Short Group Signature without Random Oracles", + year = 2007, + howpublished = "Cryptology ePrint Archive, Report 2007/450", + note = "\url{http://eprint.iacr.org/2007/450}", +} + @Misc{EPRINT:GutIbe07, author = "Jaime Gutierrez and Alvar Ibeas", @@ -315206,17 +315997,6 @@ @Misc{EPRINT:OstSke07a note = "\url{http://eprint.iacr.org/2007/059}", } -@Misc{EPRINT:LCSL07, - author = "Xiaohui Liang and - Zhenfu Cao and - Jun Shao and - Huang Lin", - title = "Short Group Signature without Random Oracles", - year = 2007, - howpublished = "Cryptology ePrint Archive, Report 2007/450", - note = "\url{http://eprint.iacr.org/2007/450}", -} - @Misc{EPRINT:KiaYun07, author = "Aggelos Kiayias and Moti Yung", @@ -317819,6 +318599,17 @@ @Misc{EPRINT:BelNamNev06 note = "\url{http://eprint.iacr.org/2006/285}", } +@Misc{EPRINT:BDPA06, + author = "Guido Bertoni and + Joan Daemen and + Micha{\"e}l Peeters and + Gilles Van Assche", + title = "RadioGat{\'u}n, a belt-and-mill hash function", + year = 2006, + howpublished = "Cryptology ePrint Archive, Report 2006/369", + note = "\url{http://eprint.iacr.org/2006/369}", +} + @Misc{EPRINT:Pestunov06, author = "Andrey Pestunov", title = "Statistical Analysis of the {MARS} Block Cipher", @@ -319085,16 +319876,6 @@ @Misc{EPRINT:NarShm06 note = "\url{http://eprint.iacr.org/2006/182}", } -@Misc{EPRINT:StaMalYun06, - author = "Francois-Xavier Standaert and - Tal G. Malkin and - Moti Yung", - title = "A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)", - year = 2006, - howpublished = "Cryptology ePrint Archive, Report 2006/139", - note = "\url{http://eprint.iacr.org/2006/139}", -} - @Misc{EPRINT:LaMLauMit06, author = "Brian LaMacchia and Kristin Lauter and @@ -319122,6 +319903,16 @@ @Misc{EPRINT:BaeWan06 note = "\url{http://eprint.iacr.org/2006/159}", } +@Misc{EPRINT:StaMalYun06, + author = "Francois-Xavier Standaert and + Tal G. Malkin and + Moti Yung", + title = "A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)", + year = 2006, + howpublished = "Cryptology ePrint Archive, Report 2006/139", + note = "\url{http://eprint.iacr.org/2006/139}", +} + @Misc{EPRINT:BoyWat06, author = "Xavier Boyen and Brent Waters", @@ -320479,17 +321270,6 @@ @Misc{EPRINT:ShaCaoWan06 note = "\url{http://eprint.iacr.org/2006/308}", } -@Misc{EPRINT:BDPA06, - author = "Guido Bertoni and - Joan Daemen and - Micha{\"e}l Peeters and - Gilles Van Assche", - title = "RadioGat{\'u}n, a belt-and-mill hash function", - year = 2006, - howpublished = "Cryptology ePrint Archive, Report 2006/369", - note = "\url{http://eprint.iacr.org/2006/369}", -} - @Misc{EPRINT:RosSto06, author = "Alexander Rostovtsev and Anton Stolbunov", @@ -331419,6 +332199,15 @@ @Misc{EPRINT:TakShiKos02 note = "\url{http://eprint.iacr.org/2002/176}", } +@Misc{EPRINT:ItkRey02, + author = "Gene Itkis and + Leonid Reyzin", + title = "{SiBIR}: Signer-Base Intrusion-Resilient Signatures", + year = 2002, + howpublished = "Cryptology ePrint Archive, Report 2002/054", + note = "\url{http://eprint.iacr.org/2002/054}", +} + @Misc{EPRINT:Goldreich02a, author = "Oded Goldreich", title = "The {GGM} Construction does {NOT} yield Correlation Intractable Function Ensembles", @@ -331435,6 +332224,14 @@ @Misc{EPRINT:Goldreich02b note = "\url{http://eprint.iacr.org/2002/186}", } +@Misc{EPRINT:Fischlin02, + author = "Marc Fischlin", + title = "The Cramer-Shoup {Strong-RSA} Signature Scheme Revisited", + year = 2002, + howpublished = "Cryptology ePrint Archive, Report 2002/017", + note = "\url{http://eprint.iacr.org/2002/017}", +} + @Misc{EPRINT:CouDauFel02, author = "Nicolas T. Courtois and Magnus Daum and @@ -331680,14 +332477,6 @@ @Misc{EPRINT:Mironov02 note = "\url{http://eprint.iacr.org/2002/067}", } -@Misc{EPRINT:Fischlin02, - author = "Marc Fischlin", - title = "The Cramer-Shoup {Strong-RSA} Signature Scheme Revisited", - year = 2002, - howpublished = "Cryptology ePrint Archive, Report 2002/017", - note = "\url{http://eprint.iacr.org/2002/017}", -} - @Misc{EPRINT:LeeLeeLee02, author = "Ho-Kyu Lee and Hyang-Sook Lee and @@ -331854,15 +332643,6 @@ @Misc{EPRINT:Lynn02 note = "\url{http://eprint.iacr.org/2002/072}", } -@Misc{EPRINT:ItkRey02, - author = "Gene Itkis and - Leonid Reyzin", - title = "{SiBIR}: Signer-Base Intrusion-Resilient Signatures", - year = 2002, - howpublished = "Cryptology ePrint Archive, Report 2002/054", - note = "\url{http://eprint.iacr.org/2002/054}", -} - @Misc{EPRINT:BloSei02, author = "J.\ Bl{\"o}emer and J.-P.\ Seifert", diff --git a/crypto_misc.bib b/crypto_misc.bib old mode 100755 new mode 100644