BibTeX records: Eric Miles

download as .bib file

@article{DBLP:journals/iandc/JahanjouMV18,
  author       = {Hamidreza Jahanjou and
                  Eric Miles and
                  Emanuele Viola},
  title        = {Local reduction},
  journal      = {Inf. Comput.},
  volume       = {261},
  pages        = {281--295},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ic.2018.02.009},
  doi          = {10.1016/J.IC.2018.02.009},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/JahanjouMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MilesSZ16,
  author       = {Eric Miles and
                  Amit Sahai and
                  Mark Zhandry},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability
                  Obfuscation over {GGH13}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {629--658},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_22},
  doi          = {10.1007/978-3-662-53008-5\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MilesSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananM16,
  author       = {Saikrishna Badrinarayanan and
                  Eric Miles and
                  Amit Sahai and
                  Mark Zhandry},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of
                  Evasive Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {764--791},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_27},
  doi          = {10.1007/978-3-662-49896-5\_27},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargMMSSZ16,
  author       = {Sanjam Garg and
                  Eric Miles and
                  Pratyay Mukherjee and
                  Amit Sahai and
                  Akshayaram Srinivasan and
                  Mark Zhandry},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Secure Obfuscation in a Weak Multilinear Map Model},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {241--268},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_10},
  doi          = {10.1007/978-3-662-53644-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GargMMSSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesSZ16,
  author       = {Eric Miles and
                  Amit Sahai and
                  Mark Zhandry},
  title        = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability
                  Obfuscation over {GGH13}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesV16,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {On the complexity of constructing pseudorandom functions (especially
                  when they don't exist)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesSZ16a,
  author       = {Eric Miles and
                  Amit Sahai and
                  Mark Zhandry},
  title        = {Secure obfuscation in a weak multilinear map model: {A} simple construction
                  secure against all known attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesSZ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMMSSZ16,
  author       = {Sanjam Garg and
                  Eric Miles and
                  Pratyay Mukherjee and
                  Amit Sahai and
                  Akshayaram Srinivasan and
                  Mark Zhandry},
  title        = {Secure Obfuscation in a Weak Multilinear Map Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {817},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/817},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMMSSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/MilesV15,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {Substitution-Permutation Networks, Pseudorandom Functions, and Natural
                  Proofs},
  journal      = {J. {ACM}},
  volume       = {62},
  number       = {6},
  pages        = {46:1--46:29},
  year         = {2015},
  url          = {https://doi.org/10.1145/2792978},
  doi          = {10.1145/2792978},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/MilesV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MilesV15,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {On the Complexity of Constructing Pseudorandom Functions (Especially
                  when They Don't Exist)},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {3},
  pages        = {509--532},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9161-x},
  doi          = {10.1007/S00145-013-9161-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MilesV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Hemanta K. Maji and
                  Eric Miles and
                  Mariana Raykova and
                  Amit Sahai and
                  Mehdi Tibouchi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_12},
  doi          = {10.1007/978-3-662-47989-6\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronGHLMM0ST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/JahanjouMV15,
  author       = {Hamid Jahanjou and
                  Eric Miles and
                  Emanuele Viola},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Kazuo Iwama and
                  Naoki Kobayashi and
                  Bettina Speckmann},
  title        = {Local Reductions},
  booktitle    = {Automata, Languages, and Programming - 42nd International Colloquium,
                  {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9134},
  pages        = {749--760},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47672-7\_61},
  doi          = {10.1007/978-3-662-47672-7\_61},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/JahanjouMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananM15,
  author       = {Saikrishna Badrinarayanan and
                  Eric Miles and
                  Amit Sahai and
                  Mark Zhandry},
  title        = {Post-Zeroizing Obfuscation: The case of Evasive Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronGHLMM0ST15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Hemanta K. Maji and
                  Eric Miles and
                  Mariana Raykova and
                  Amit Sahai and
                  Mehdi Tibouchi},
  title        = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronGHLMM0ST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalDJMR14,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Zahra Jafargholi and
                  Eric Miles and
                  Leonid Reyzin},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Amplifying Privacy in Privacy Amplification},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_11},
  doi          = {10.1007/978-3-662-44381-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalDJMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/Miles14,
  author       = {Eric Miles},
  editor       = {Moni Naor},
  title        = {Iterated group products and leakage resilience against {NC1}},
  booktitle    = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ,
                  USA, January 12-14, 2014},
  pages        = {261--268},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554797.2554822},
  doi          = {10.1145/2554797.2554822},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/Miles14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/JahanjouMV14,
  author       = {Hamidreza Jahanjou and
                  Eric Miles and
                  Emanuele Viola},
  title        = {Succinct and explicit circuits for sorting and connectivity},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-037}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/037},
  eprinttype    = {ECCC},
  eprint       = {TR14-037},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/JahanjouMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesSW14,
  author       = {Eric Miles and
                  Amit Sahai and
                  Mor Weiss},
  title        = {Protecting obfuscation against arithmetic attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {878},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/878},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/MilesV13,
  author       = {Eric Miles and
                  Emanuele Viola},
  editor       = {Dan Boneh and
                  Tim Roughgarden and
                  Joan Feigenbaum},
  title        = {Shielding circuits with groups},
  booktitle    = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
                  USA, June 1-4, 2013},
  pages        = {251--260},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488608.2488640},
  doi          = {10.1145/2488608.2488640},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/MilesV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JahanjouMV13,
  author       = {Hamidreza Jahanjou and
                  Eric Miles and
                  Emanuele Viola},
  title        = {Local reductions},
  journal      = {CoRR},
  volume       = {abs/1311.3171},
  year         = {2013},
  url          = {http://arxiv.org/abs/1311.3171},
  eprinttype    = {arXiv},
  eprint       = {1311.3171},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JahanjouMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Miles13,
  author       = {Eric Miles},
  title        = {Iterated group products and leakage resilience against NC{\^{}}1},
  journal      = {CoRR},
  volume       = {abs/1312.3193},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.3193},
  eprinttype    = {arXiv},
  eprint       = {1312.3193},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Miles13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/JahanjouMV13,
  author       = {Hamidreza Jahanjou and
                  Eric Miles and
                  Emanuele Viola},
  title        = {Local reductions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR13-099}},
  year         = {2013},
  url          = {https://eccc.weizmann.ac.il/report/2013/099},
  eprinttype    = {ECCC},
  eprint       = {TR13-099},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/JahanjouMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/MilesV13,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {Shielding circuits with groups},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR13-003}},
  year         = {2013},
  url          = {https://eccc.weizmann.ac.il/report/2013/003},
  eprinttype    = {ECCC},
  eprint       = {TR13-003},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/MilesV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesV13,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {Shielding circuits with groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDJMR13,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Zahra Jafargholi and
                  Eric Miles and
                  Leonid Reyzin},
  title        = {Amplifying Privacy in Privacy Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDJMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Miles13,
  author       = {Eric Miles},
  title        = {Iterated group products and leakage resilience against NC\({}^{\mbox{1}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {815},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/815},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Miles13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MilesV12,
  author       = {Eric Miles and
                  Emanuele Viola},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Substitution-Permutation Networks, Pseudorandom Functions, and Natural
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {68--85},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_5},
  doi          = {10.1007/978-3-642-32009-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MilesV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/JafargholiJMRV12,
  author       = {Zahra Jafargholi and
                  Hamidreza Jahanjou and
                  Eric Miles and
                  Jaideep Ramachandran and
                  Emanuele Viola},
  title        = {From {RAM} to {SAT}},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-125}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/125},
  eprinttype    = {ECCC},
  eprint       = {TR12-125},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/JafargholiJMRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/MilesV12,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {On the complexity of constructing pseudorandom functions (especially
                  when they don't exist)},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-019}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/019},
  eprinttype    = {ECCC},
  eprint       = {TR12-019},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/MilesV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MilesV11,
  author       = {Eric Miles and
                  Emanuele Viola},
  editor       = {Yuval Ishai},
  title        = {On the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom
                  Generators},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {522--539},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_31},
  doi          = {10.1007/978-3-642-19571-6\_31},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MilesV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/MilesV11,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {The Advanced Encryption Standard, Candidate Pseudorandom Functions,
                  and Natural Proofs},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR11-076}},
  year         = {2011},
  url          = {https://eccc.weizmann.ac.il/report/2011/076},
  eprinttype    = {ECCC},
  eprint       = {TR11-076},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/MilesV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesV11,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {The Advanced Encryption Standard, Candidate Pseudorandom Functions,
                  and Natural Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0801-1307,
  author       = {Chris Pollett and
                  Eric Miles},
  title        = {Alternating Hierarchies for Time-Space Tradeoffs},
  journal      = {CoRR},
  volume       = {abs/0801.1307},
  year         = {2008},
  url          = {http://arxiv.org/abs/0801.1307},
  eprinttype    = {arXiv},
  eprint       = {0801.1307},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0801-1307.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics